CVE-2025-24996: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1507
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
AI Analysis
Technical Summary
CVE-2025-24996 is a vulnerability categorized under CWE-73 (External Control of File Name or Path) affecting Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw resides in the handling of file names or paths within the NTLM authentication mechanism, which is used for network authentication in Windows environments. An attacker can exploit this vulnerability remotely over a network without requiring privileges but needs user interaction, such as convincing a user to connect to a malicious server or resource. By controlling the file name or path externally, the attacker can perform spoofing attacks that may lead to unauthorized disclosure of sensitive information, particularly impacting confidentiality. The CVSS v3.1 score is 6.5 (medium severity), reflecting the ease of network exploitation and the high confidentiality impact, but no impact on integrity or availability. The vulnerability does not require prior authentication, increasing its risk in environments where legacy NTLM authentication is still in use. No known exploits have been reported in the wild, and Microsoft has not yet released an official patch. The vulnerability is significant for organizations still running the original Windows 10 Version 1507, which is an older release no longer supported with security updates. Attackers could leverage this flaw to spoof network resources, potentially capturing credentials or redirecting users to malicious endpoints. This vulnerability highlights the risks of relying on outdated operating systems and legacy authentication protocols in modern network environments.
Potential Impact
For European organizations, the primary impact of CVE-2025-24996 is the potential compromise of confidentiality through spoofing attacks in NTLM authentication. Organizations using Windows 10 Version 1507, especially in legacy or industrial control environments, may be vulnerable to attackers intercepting or redirecting authentication requests, leading to credential theft or unauthorized access. This could facilitate lateral movement within networks or data exfiltration. Critical sectors such as finance, government, healthcare, and energy that rely on legacy Windows systems and NTLM authentication are particularly at risk. The vulnerability does not affect system integrity or availability directly but could be a stepping stone for more advanced attacks. Since no patch is currently available, the risk remains until mitigations are applied or systems are upgraded. The medium severity rating indicates a moderate but actionable threat, especially in environments where user interaction can be manipulated via phishing or social engineering. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
1. Upgrade affected systems from Windows 10 Version 1507 to a supported and fully patched version of Windows 10 or later to eliminate the vulnerability. 2. Disable or restrict the use of NTLM authentication where possible, migrating to more secure protocols such as Kerberos. 3. Implement network segmentation and restrict access to legacy systems to minimize exposure to untrusted networks. 4. Use network-level protections such as SMB signing and enforce SMB protocol restrictions to prevent spoofing and man-in-the-middle attacks. 5. Monitor network traffic for unusual NTLM authentication attempts or anomalies that could indicate exploitation attempts. 6. Educate users to recognize and avoid phishing or social engineering tactics that could trigger user interaction required for exploitation. 7. Apply strict Group Policy settings to control authentication protocols and limit external control over file paths or names. 8. Employ endpoint detection and response (EDR) solutions to detect suspicious activities related to NTLM spoofing. 9. Regularly audit and inventory legacy systems to prioritize remediation efforts. 10. Stay informed on Microsoft advisories for any forthcoming patches or updates addressing this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2025-24996: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1507
Description
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-24996 is a vulnerability categorized under CWE-73 (External Control of File Name or Path) affecting Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw resides in the handling of file names or paths within the NTLM authentication mechanism, which is used for network authentication in Windows environments. An attacker can exploit this vulnerability remotely over a network without requiring privileges but needs user interaction, such as convincing a user to connect to a malicious server or resource. By controlling the file name or path externally, the attacker can perform spoofing attacks that may lead to unauthorized disclosure of sensitive information, particularly impacting confidentiality. The CVSS v3.1 score is 6.5 (medium severity), reflecting the ease of network exploitation and the high confidentiality impact, but no impact on integrity or availability. The vulnerability does not require prior authentication, increasing its risk in environments where legacy NTLM authentication is still in use. No known exploits have been reported in the wild, and Microsoft has not yet released an official patch. The vulnerability is significant for organizations still running the original Windows 10 Version 1507, which is an older release no longer supported with security updates. Attackers could leverage this flaw to spoof network resources, potentially capturing credentials or redirecting users to malicious endpoints. This vulnerability highlights the risks of relying on outdated operating systems and legacy authentication protocols in modern network environments.
Potential Impact
For European organizations, the primary impact of CVE-2025-24996 is the potential compromise of confidentiality through spoofing attacks in NTLM authentication. Organizations using Windows 10 Version 1507, especially in legacy or industrial control environments, may be vulnerable to attackers intercepting or redirecting authentication requests, leading to credential theft or unauthorized access. This could facilitate lateral movement within networks or data exfiltration. Critical sectors such as finance, government, healthcare, and energy that rely on legacy Windows systems and NTLM authentication are particularly at risk. The vulnerability does not affect system integrity or availability directly but could be a stepping stone for more advanced attacks. Since no patch is currently available, the risk remains until mitigations are applied or systems are upgraded. The medium severity rating indicates a moderate but actionable threat, especially in environments where user interaction can be manipulated via phishing or social engineering. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
1. Upgrade affected systems from Windows 10 Version 1507 to a supported and fully patched version of Windows 10 or later to eliminate the vulnerability. 2. Disable or restrict the use of NTLM authentication where possible, migrating to more secure protocols such as Kerberos. 3. Implement network segmentation and restrict access to legacy systems to minimize exposure to untrusted networks. 4. Use network-level protections such as SMB signing and enforce SMB protocol restrictions to prevent spoofing and man-in-the-middle attacks. 5. Monitor network traffic for unusual NTLM authentication attempts or anomalies that could indicate exploitation attempts. 6. Educate users to recognize and avoid phishing or social engineering tactics that could trigger user interaction required for exploitation. 7. Apply strict Group Policy settings to control authentication protocols and limit external control over file paths or names. 8. Employ endpoint detection and response (EDR) solutions to detect suspicious activities related to NTLM spoofing. 9. Regularly audit and inventory legacy systems to prioritize remediation efforts. 10. Stay informed on Microsoft advisories for any forthcoming patches or updates addressing this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-01-30T15:14:20.993Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb37e
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 2/14/2026, 9:03:50 AM
Last updated: 3/24/2026, 10:55:08 PM
Views: 261
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.