Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24996: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-24996cvecve-2025-24996cwe-73
Published: Tue Mar 11 2025 (03/11/2025, 16:59:03 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 12/18/2025, 00:00:04 UTC

Technical Analysis

CVE-2025-24996 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises from improper handling of file names or paths in the context of NTLM authentication, allowing an attacker on the network to manipulate these parameters externally. This manipulation can lead to spoofing attacks, where the attacker deceives systems or users by masquerading as a trusted entity. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), such as clicking a malicious link or opening a crafted file. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The vulnerability primarily impacts confidentiality (C:H) without affecting integrity or availability. No patches or exploits are currently publicly available, but the vulnerability is officially published and recognized by Microsoft and CISA. The flaw is significant because NTLM is still widely used in many enterprise environments for legacy authentication, and external control of file paths can facilitate sophisticated spoofing attacks that may lead to credential theft or unauthorized access. The lack of integrity and availability impact reduces the overall severity, but the confidentiality risk remains substantial, especially in environments where sensitive data is transmitted over NTLM-authenticated sessions.

Potential Impact

For European organizations, the primary impact of CVE-2025-24996 is the potential compromise of confidentiality through network spoofing attacks leveraging NTLM authentication weaknesses. Organizations relying on Windows 10 Version 1809, particularly those that have not upgraded to newer Windows versions or disabled NTLM, are at risk. This vulnerability could be exploited to intercept or redirect authentication attempts, potentially leading to unauthorized access to sensitive systems or data. Critical sectors such as finance, government, healthcare, and energy, which often maintain legacy systems or have complex network environments, may face increased risk. The attack requires user interaction, which somewhat limits mass exploitation but does not eliminate targeted spear-phishing or social engineering attacks. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation. The medium severity rating suggests that while the vulnerability is serious, it is not critical, but it should be addressed promptly to prevent escalation or chaining with other vulnerabilities.

Mitigation Recommendations

To mitigate CVE-2025-24996, European organizations should: 1) Disable NTLM authentication where feasible, replacing it with more secure protocols such as Kerberos or modern authentication frameworks; 2) Apply strict network segmentation and access controls to limit exposure of NTLM-enabled systems; 3) Educate users to recognize and avoid phishing attempts that could trigger the required user interaction for exploitation; 4) Monitor network traffic for anomalous NTLM authentication requests or suspicious file path manipulations; 5) Upgrade affected systems from Windows 10 Version 1809 to supported, patched versions of Windows that do not contain this vulnerability; 6) Implement application whitelisting and endpoint protection to detect and block attempts to exploit path manipulation; 7) Regularly audit and harden group policies related to authentication and file path handling; 8) Stay informed about vendor updates and apply patches promptly once available; 9) Employ multi-factor authentication to reduce the impact of credential theft resulting from spoofing attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-30T15:14:20.993Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb37e

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 12/18/2025, 12:00:04 AM

Last updated: 1/19/2026, 8:01:18 AM

Views: 174

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats