Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29975: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Microsoft PC Manager

0
High
VulnerabilityCVE-2025-29975cvecve-2025-29975cwe-59
Published: Tue May 13 2025 (05/13/2025, 16:58:35 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft PC Manager

Description

Improper link resolution before file access ('link following') in Microsoft PC Manager allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:43:50 UTC

Technical Analysis

CVE-2025-29975 is a vulnerability identified in Microsoft PC Manager version 1.0.0, classified under CWE-59: Improper Link Resolution Before File Access ('Link Following'). This vulnerability arises when the software improperly resolves symbolic or hard links before accessing files, allowing an attacker with authorized local access to manipulate the file system paths. By exploiting this flaw, an attacker can trick the application into accessing or modifying files that should be protected, thereby escalating their privileges on the local machine. The vulnerability does not require user interaction and has a low attack complexity, but it does require the attacker to have some level of local privileges (PR:L). The impact is severe, affecting confidentiality, integrity, and availability, as the attacker can gain elevated privileges and potentially take full control of the system. The vulnerability was published on May 13, 2025, with a CVSS v3.1 score of 7.8, indicating a high severity level. No public exploits are known at this time, but the presence of this vulnerability in a widely used Microsoft product makes it a significant concern. The vulnerability is particularly relevant for environments where Microsoft PC Manager is deployed and where local user accounts have limited but exploitable privileges.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Microsoft products in enterprise and government environments. Successful exploitation could allow attackers to elevate privileges from a limited user account to administrative levels, leading to unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within networks. This can result in data breaches, operational downtime, and compliance violations under regulations such as GDPR. The local nature of the exploit means that insider threats or attackers who have gained initial footholds via other means could leverage this vulnerability to deepen their access. The high impact on confidentiality, integrity, and availability underscores the critical need for timely mitigation. Organizations with remote or hybrid workforces may face increased risk if endpoint devices running Microsoft PC Manager are not adequately secured.

Mitigation Recommendations

1. Apply patches or updates from Microsoft as soon as they become available for PC Manager 1.0.0 to address this vulnerability. 2. Until patches are released, restrict local user permissions to the minimum necessary, preventing users from having write access to directories or files that could be exploited via link following. 3. Implement application whitelisting and endpoint protection solutions to monitor and block suspicious local file system activities, including abnormal link resolutions. 4. Conduct regular audits of local user accounts and privileges to identify and remove unnecessary elevated permissions. 5. Employ robust endpoint detection and response (EDR) tools to detect potential exploitation attempts involving privilege escalation. 6. Educate IT and security teams about the vulnerability specifics to enhance monitoring and incident response readiness. 7. Isolate critical systems where feasible to limit the impact of potential local privilege escalations. 8. Review and harden file system permissions and symbolic link usage policies to reduce attack surface related to link following vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-12T17:54:45.710Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb9c4

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:43:50 AM

Last updated: 3/24/2026, 4:25:40 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses