Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21420: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-21420cvecve-2025-21420cwe-59
Published: Tue Feb 11 2025 (02/11/2025, 17:58:19 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Windows Disk Cleanup Tool Elevation of Privilege Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:52:10 UTC

Technical Analysis

CVE-2025-21420 is an elevation of privilege vulnerability identified in the Windows Disk Cleanup Tool on Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The root cause is improper link resolution before file access, classified under CWE-59 ('Link Following'). This flaw allows a local attacker with limited privileges (low-level user) to exploit symbolic link or junction point handling within the Disk Cleanup Tool, causing it to access or modify files it should not. Because the tool runs with elevated privileges, this can lead to unauthorized modification of system files or execution of arbitrary code with higher privileges, compromising system confidentiality, integrity, and availability. The CVSS 3.1 score of 7.8 reflects high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits have been reported in the wild, and no official patches have been published yet, though the vulnerability was reserved in December 2024 and published in February 2025. This vulnerability primarily affects legacy Windows 10 systems, which may still be in use in certain enterprise environments. Exploitation could allow attackers to gain elevated privileges, facilitating further attacks such as malware installation, data theft, or system disruption.

Potential Impact

For European organizations, the impact of CVE-2025-21420 can be significant, especially for those still operating legacy Windows 10 Version 1507 systems. Successful exploitation enables local attackers to escalate privileges, potentially gaining administrative control over affected machines. This can lead to unauthorized access to sensitive data, disruption of critical services, and deployment of persistent malware. Sectors such as government, finance, healthcare, and critical infrastructure are particularly at risk due to the sensitive nature of their data and operations. The vulnerability's ability to compromise confidentiality, integrity, and availability simultaneously raises the stakes for organizations relying on these outdated systems. Additionally, the lack of user interaction required for exploitation increases the risk of automated or stealthy attacks within internal networks. European entities with legacy IT environments or insufficient patch management processes face heightened exposure, potentially leading to regulatory compliance issues and reputational damage.

Mitigation Recommendations

To mitigate CVE-2025-21420, European organizations should take immediate and specific actions beyond generic patching advice: 1) Identify and inventory all systems running Windows 10 Version 1507 (build 10.0.10240.0) to understand exposure scope. 2) Restrict access to the Disk Cleanup Tool via Group Policy or software restriction policies to limit who can execute it, especially on legacy systems. 3) Monitor and audit usage of the Disk Cleanup Tool and related system calls for suspicious activity indicative of exploitation attempts. 4) Implement application whitelisting to prevent unauthorized execution of potentially malicious scripts or binaries exploiting this vulnerability. 5) Prioritize upgrading affected systems to supported Windows versions with active security updates, as Windows 10 Version 1507 is an early release with known limitations. 6) Prepare to deploy official patches promptly once Microsoft releases them, and test patches in controlled environments before wide deployment. 7) Enhance endpoint detection and response (EDR) capabilities to detect privilege escalation behaviors. 8) Educate IT staff about this vulnerability and the importance of minimizing legacy system use. These targeted measures will reduce the attack surface and limit potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.377Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69432f05058703ef3fc985e3

Added to database: 12/17/2025, 10:30:29 PM

Last enriched: 2/14/2026, 8:52:10 AM

Last updated: 3/23/2026, 6:00:03 PM

Views: 166

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses