Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29837: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-29837cvecve-2025-29837cwe-59
Published: Tue May 13 2025 (05/13/2025, 16:59:00 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to disclose information locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:38:24 UTC

Technical Analysis

CVE-2025-29837 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access, also known as 'link following') affecting Microsoft Windows 10 Version 1507 (build 10240.0). The issue resides in the Windows Installer component, where the system improperly resolves symbolic links before accessing files. An authorized attacker with local access and limited privileges can exploit this flaw to disclose sensitive information by manipulating symbolic links to redirect file access to unintended locations. This can lead to unauthorized reading of files that the attacker should not normally access, compromising confidentiality. The vulnerability does not allow modification or deletion of files (no integrity or availability impact) and does not require user interaction, but it does require local authenticated access. The CVSS 3.1 base score is 5.5 (medium severity), reflecting the local attack vector, low complexity, and high confidentiality impact. No public exploits or patches are currently available, but the vulnerability has been officially published and recognized by CISA. The affected Windows 10 version is the initial release from 2015, which is largely superseded by newer versions but may still be present in legacy or specialized environments. The vulnerability highlights the risks of legacy software components and the importance of secure link resolution in file system operations.

Potential Impact

For European organizations, the primary impact of CVE-2025-29837 is the potential unauthorized disclosure of sensitive information on systems running the original Windows 10 Version 1507. Although this version is outdated, some critical infrastructure, industrial control systems, or legacy enterprise environments may still operate it due to compatibility or upgrade constraints. Confidentiality breaches could expose intellectual property, personal data, or configuration details, potentially aiding further attacks. Since the vulnerability requires local authenticated access, the risk is higher in environments with many users or where attackers can gain initial footholds through phishing or insider threats. The lack of impact on integrity and availability reduces the risk of system disruption but does not eliminate the threat of data leakage. European organizations in sectors such as manufacturing, government, and healthcare, which may have legacy Windows 10 deployments, should be particularly vigilant. The absence of known exploits in the wild lowers immediate risk but does not preclude future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2025-29837, European organizations should prioritize upgrading from Windows 10 Version 1507 to a supported, patched version of Windows 10 or Windows 11, as this version is no longer supported and lacks security updates. In environments where immediate upgrade is not feasible, restrict local user permissions to limit who can access Windows Installer components and create or manipulate symbolic links. Implement strict file system ACLs to prevent unauthorized link creation or redirection. Employ endpoint detection and response (EDR) tools to monitor suspicious local activities involving symbolic links or Windows Installer processes. Conduct regular audits of legacy systems to identify outdated Windows versions and plan phased upgrades. Additionally, enforce network segmentation and least privilege principles to reduce the risk of local attacker footholds. Since no patches are currently available, these compensating controls are critical to reduce exposure. Finally, maintain awareness of updates from Microsoft and apply patches promptly once released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-11T22:56:43.944Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb96f

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:38:24 AM

Last updated: 3/25/2026, 1:31:37 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses