Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26684: CWE-73: External Control of File Name or Path in Microsoft Microsoft Defender for Endpoint for Linux

0
Medium
VulnerabilityCVE-2025-26684cvecve-2025-26684cwe-73
Published: Tue May 13 2025 (05/13/2025, 16:58:26 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Defender for Endpoint for Linux

Description

External control of file name or path in Microsoft Defender for Endpoint allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:35:14 UTC

Technical Analysis

CVE-2025-26684 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Microsoft Defender for Endpoint for Linux, specifically version 101.0.0. This vulnerability allows an authorized attacker with local access and high privileges to manipulate file names or paths that the Defender software uses, leading to privilege escalation. The core issue is that the software improperly validates or sanitizes file path inputs, enabling attackers to influence which files are accessed or executed by the Defender process. This can result in the attacker gaining elevated privileges beyond their original scope, potentially compromising system confidentiality, integrity, and availability. The CVSS v3.1 score is 6.7, indicating a medium severity level, with attack vector local, low attack complexity, and no user interaction required. The vulnerability does not currently have known exploits in the wild, and no patches have been released at the time of publication. However, given the critical role of Defender in endpoint security, exploitation could allow attackers to disable or bypass security controls, execute arbitrary code with elevated privileges, or manipulate system files. The vulnerability is particularly relevant to Linux environments where Microsoft Defender is deployed, often in enterprise or cloud server contexts.

Potential Impact

For European organizations, this vulnerability poses a significant risk to Linux-based endpoints protected by Microsoft Defender for Endpoint. Successful exploitation could allow attackers to escalate privileges locally, potentially leading to full system compromise, data breaches, or disruption of security monitoring capabilities. This is especially concerning for critical infrastructure, financial institutions, and enterprises relying on Defender for threat detection and response. The impact extends to confidentiality (unauthorized data access), integrity (tampering with system or security files), and availability (disabling security functions). Since the attack requires local access with high privileges, insider threats or attackers who have already breached perimeter defenses could leverage this vulnerability to deepen their foothold. The lack of a patch increases the urgency for interim mitigations. European organizations with hybrid or cloud environments using Linux servers are at heightened risk, as these systems often run critical workloads and are targets for sophisticated attackers.

Mitigation Recommendations

1. Restrict local user permissions rigorously to minimize the number of users with high privileges on Linux systems running Microsoft Defender. 2. Implement strict file system monitoring and auditing to detect unusual file path manipulations or unauthorized changes in Defender-related directories. 3. Use mandatory access controls (e.g., SELinux, AppArmor) to limit Defender’s file system interactions to only necessary paths. 4. Isolate Defender processes where possible using containerization or sandboxing techniques to reduce the impact of exploitation. 5. Maintain comprehensive logging and alerting to quickly identify suspicious local activities indicative of exploitation attempts. 6. Prepare for rapid deployment of vendor patches once released by Microsoft; subscribe to official security advisories. 7. Conduct regular security assessments and penetration tests focusing on privilege escalation vectors in Linux environments. 8. Educate system administrators about the risks of privilege escalation vulnerabilities and the importance of least privilege principles. 9. Consider additional endpoint protection layers or anomaly detection systems to complement Defender’s capabilities until the vulnerability is patched.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T22:35:41.551Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb946

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:35:14 AM

Last updated: 3/24/2026, 9:11:54 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses