Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24054: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-24054cvecve-2025-24054cwe-73
Published: Tue Mar 11 2025 (03/11/2025, 16:59:09 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:55:02 UTC

Technical Analysis

CVE-2025-24054 is a vulnerability categorized under CWE-73 (External Control of File Name or Path) found in Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The issue arises from improper handling of file names or paths within the NTLM authentication protocol, which is still used in many enterprise environments for network authentication. An attacker without any privileges can exploit this vulnerability remotely over the network by manipulating the file path parameters involved in NTLM authentication exchanges. This manipulation can lead to spoofing attacks, where the attacker can masquerade as a legitimate entity or intercept sensitive information, thereby compromising confidentiality. The vulnerability requires user interaction, such as the victim initiating an authentication process, but does not require prior authentication or elevated privileges. The flaw does not affect system integrity or availability directly but can expose sensitive data or credentials. The CVSS v3.1 score of 6.5 reflects a medium severity, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but user interaction required (UI:R). The scope remains unchanged (S:U), and the impact is high on confidentiality (C:H) but none on integrity or availability. No public exploits have been reported yet, and no patches are currently linked, indicating a need for vigilance and proactive mitigation. The vulnerability was reserved in January 2025 and published in March 2025, with enrichment from CISA indicating recognized importance.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality, as attackers can potentially spoof network identities and intercept sensitive authentication data. Organizations still running Windows 10 Version 1507, particularly in legacy or industrial control environments, are vulnerable. The exploitation could lead to unauthorized access to network resources or data leakage, impacting sectors such as finance, government, healthcare, and critical infrastructure. Since NTLM is often used in backward compatibility scenarios or in mixed environments, enterprises relying on it may face increased risk. The requirement for user interaction limits automated widespread exploitation but targeted phishing or social engineering campaigns could trigger the vulnerability. The lack of impact on integrity and availability reduces the risk of system disruption but does not diminish the threat to sensitive information confidentiality. European GDPR regulations heighten the importance of protecting personal data, making confidentiality breaches particularly consequential. The absence of known exploits provides a window for mitigation before active attacks emerge.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1507 to a supported and patched Windows version to eliminate the vulnerability. 2. Disable NTLM authentication where possible, or restrict its use via Group Policy to limit exposure, especially on critical systems. 3. Implement network segmentation and strict access controls to reduce the attack surface for NTLM-based attacks. 4. Employ multi-factor authentication (MFA) to reduce reliance on NTLM and strengthen authentication security. 5. Monitor network traffic for unusual NTLM authentication attempts or anomalies indicative of spoofing. 6. Educate users to recognize and avoid phishing or social engineering attempts that could trigger user interaction exploitation. 7. Apply principle of least privilege to reduce potential impact if credentials are compromised. 8. Use endpoint detection and response (EDR) tools to detect suspicious activities related to authentication processes. 9. Regularly review and update security policies to phase out legacy protocols like NTLM in favor of more secure alternatives such as Kerberos or certificate-based authentication.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-16T23:11:19.733Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb31b

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 2/14/2026, 8:55:02 AM

Last updated: 3/24/2026, 9:22:29 PM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses