Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24996: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-24996cvecve-2025-24996cwe-73
Published: Tue Mar 11 2025 (03/11/2025, 16:59:03 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:03:50 UTC

Technical Analysis

CVE-2025-24996 is a vulnerability categorized under CWE-73 (External Control of File Name or Path) affecting Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw resides in the handling of file names or paths within the NTLM authentication mechanism, which is used for network authentication in Windows environments. An attacker can exploit this vulnerability remotely over a network without requiring privileges but needs user interaction, such as convincing a user to connect to a malicious server or resource. By controlling the file name or path externally, the attacker can perform spoofing attacks that may lead to unauthorized disclosure of sensitive information, particularly impacting confidentiality. The CVSS v3.1 score is 6.5 (medium severity), reflecting the ease of network exploitation and the high confidentiality impact, but no impact on integrity or availability. The vulnerability does not require prior authentication, increasing its risk in environments where legacy NTLM authentication is still in use. No known exploits have been reported in the wild, and Microsoft has not yet released an official patch. The vulnerability is significant for organizations still running the original Windows 10 Version 1507, which is an older release no longer supported with security updates. Attackers could leverage this flaw to spoof network resources, potentially capturing credentials or redirecting users to malicious endpoints. This vulnerability highlights the risks of relying on outdated operating systems and legacy authentication protocols in modern network environments.

Potential Impact

For European organizations, the primary impact of CVE-2025-24996 is the potential compromise of confidentiality through spoofing attacks in NTLM authentication. Organizations using Windows 10 Version 1507, especially in legacy or industrial control environments, may be vulnerable to attackers intercepting or redirecting authentication requests, leading to credential theft or unauthorized access. This could facilitate lateral movement within networks or data exfiltration. Critical sectors such as finance, government, healthcare, and energy that rely on legacy Windows systems and NTLM authentication are particularly at risk. The vulnerability does not affect system integrity or availability directly but could be a stepping stone for more advanced attacks. Since no patch is currently available, the risk remains until mitigations are applied or systems are upgraded. The medium severity rating indicates a moderate but actionable threat, especially in environments where user interaction can be manipulated via phishing or social engineering. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1507 to a supported and fully patched version of Windows 10 or later to eliminate the vulnerability. 2. Disable or restrict the use of NTLM authentication where possible, migrating to more secure protocols such as Kerberos. 3. Implement network segmentation and restrict access to legacy systems to minimize exposure to untrusted networks. 4. Use network-level protections such as SMB signing and enforce SMB protocol restrictions to prevent spoofing and man-in-the-middle attacks. 5. Monitor network traffic for unusual NTLM authentication attempts or anomalies that could indicate exploitation attempts. 6. Educate users to recognize and avoid phishing or social engineering tactics that could trigger user interaction required for exploitation. 7. Apply strict Group Policy settings to control authentication protocols and limit external control over file paths or names. 8. Employ endpoint detection and response (EDR) solutions to detect suspicious activities related to NTLM spoofing. 9. Regularly audit and inventory legacy systems to prioritize remediation efforts. 10. Stay informed on Microsoft advisories for any forthcoming patches or updates addressing this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-30T15:14:20.993Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb37e

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 2/14/2026, 9:03:50 AM

Last updated: 3/25/2026, 4:36:17 AM

Views: 262

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses