Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-33053: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-33053cvecve-2025-33053cwe-73
Published: Tue Jun 10 2025 (06/10/2025, 17:02:31 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network.

AI-Powered Analysis

AILast updated: 10/21/2025, 20:16:31 UTC

Technical Analysis

CVE-2025-33053 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Microsoft Windows 10 Version 1809 (build 17763.0). The issue arises from improper handling of Internet Shortcut Files (.url files), which can be manipulated by an attacker to control file paths or names externally. This flaw enables an attacker to craft malicious shortcut files that, when opened by a user, can trigger arbitrary code execution remotely over a network without requiring any privileges or prior authentication. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its high severity due to the ease of exploitation (network attack vector, low attack complexity), the lack of required privileges, and the significant impact on confidentiality, integrity, and availability. User interaction is required, typically opening or interacting with the malicious shortcut file. Although no known exploits are publicly reported yet and no patches have been released, the vulnerability poses a serious risk especially in environments where users receive shortcut files from untrusted sources or over the network. The flaw could be leveraged in spear-phishing campaigns or through compromised network shares. The vulnerability was reserved in April 2025 and published in June 2025, indicating recent discovery and disclosure. The lack of patch availability necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

For European organizations, this vulnerability presents a significant risk due to the widespread use of Windows 10 Version 1809 in enterprise and government sectors. Successful exploitation could lead to remote code execution, allowing attackers to gain control over affected systems, steal sensitive data, disrupt operations, or deploy ransomware. The requirement for user interaction means social engineering or phishing could be effective attack vectors. Organizations with extensive network connectivity or those that handle external files frequently are particularly vulnerable. The impact on confidentiality, integrity, and availability is high, potentially affecting critical infrastructure, financial institutions, healthcare providers, and public administration. Given the lack of patches, the window of exposure remains open, increasing the urgency for proactive defenses. The vulnerability could also facilitate lateral movement within networks if exploited, compounding the threat.

Mitigation Recommendations

1. Implement strict email and network filtering to block or quarantine Internet Shortcut Files (.url) from untrusted or external sources. 2. Educate users to avoid opening shortcut files received via email or downloaded from untrusted websites or network shares. 3. Employ application whitelisting and endpoint protection solutions that can detect or block execution triggered by malicious shortcut files. 4. Restrict user permissions to prevent execution of unauthorized files and limit the impact of potential exploitation. 5. Monitor network traffic and endpoint behavior for suspicious activities related to shortcut file handling or unexpected code execution. 6. Consider disabling the handling of Internet Shortcut Files via Group Policy or registry settings if feasible in the environment. 7. Maintain up-to-date backups and incident response plans to mitigate damage in case of compromise. 8. Track Microsoft advisories closely for forthcoming patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-04-15T17:46:28.198Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f501b0bd07c39389a5b

Added to database: 6/10/2025, 6:54:08 PM

Last enriched: 10/21/2025, 8:16:31 PM

Last updated: 11/20/2025, 8:58:25 PM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats