CVE-2025-46294: The IIS Shortname Vulnerability exploits how Microsoft IIS handles legacy 8.3 short filenames, allowing attackers to infer the existence of files or directories by crafting requests with the tilde (~) character. in Claris FileMaker Server
CVE-2025-46294 is a medium-severity vulnerability affecting Claris FileMaker Server that leverages Microsoft IIS's handling of legacy 8. 3 short filenames. Attackers can exploit this by sending crafted requests containing the tilde (~) character to infer the existence of files or directories on the server, potentially revealing sensitive information. The vulnerability does not allow modification or deletion of data, nor does it require authentication or user interaction. It primarily impacts confidentiality by enabling information disclosure. FileMaker Server 22. 0. 4 addresses this issue by providing an option to disable IIS short filename enumeration via the NtfsDisable8dot3NameCreation registry setting. European organizations using vulnerable versions of FileMaker Server on IIS should apply this update promptly. Countries with significant adoption of Microsoft IIS and FileMaker Server, such as Germany, the UK, France, and the Netherlands, are more likely to be affected.
AI Analysis
Technical Summary
CVE-2025-46294 is a vulnerability in Claris FileMaker Server that exploits the way Microsoft Internet Information Services (IIS) handles legacy 8.3 short filenames. IIS supports backward compatibility with the 8.3 filename convention, which represents long filenames in a truncated format with a tilde (~) character. Attackers can craft HTTP requests containing the tilde character to enumerate short filenames and infer the existence of files or directories on the server. This side-channel information disclosure can reveal hidden or sensitive files that might otherwise be inaccessible or unknown to an attacker. The vulnerability does not allow direct access to file contents or modification but leaks metadata about the file system structure, which can be leveraged in further attacks such as targeted reconnaissance or privilege escalation. The issue arises because IIS responds differently to requests with valid versus invalid shortname patterns, enabling attackers to distinguish existing files. Claris addressed this vulnerability in FileMaker Server version 22.0.4 by including an installer option to disable IIS short filename enumeration through the Windows registry key NtfsDisable8dot3NameCreation. Disabling 8.3 name creation prevents IIS from generating or recognizing these legacy short filenames, mitigating the attack vector. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited confidentiality impact without integrity or availability effects. No known exploits have been reported in the wild, but the vulnerability poses a risk to organizations running vulnerable FileMaker Server versions on IIS, especially where sensitive data is stored. The CWE classification is CWE-200 (Information Exposure).
Potential Impact
For European organizations, this vulnerability primarily threatens confidentiality by allowing attackers to discover the presence of files or directories that may contain sensitive information. While it does not directly compromise data integrity or availability, the information gained can facilitate more targeted attacks, such as identifying configuration files, backup files, or proprietary data stores. Organizations using Claris FileMaker Server on Microsoft IIS are at risk, particularly if they have not applied the 22.0.4 update or disabled 8.3 name creation. This could impact sectors with sensitive data such as finance, healthcare, government, and legal services. The ease of exploitation (no authentication or user interaction required) increases the risk of opportunistic scanning and reconnaissance by attackers. However, the lack of known exploits in the wild and the medium severity score suggest the immediate risk is moderate. Still, failure to mitigate could lead to information leakage that aids in subsequent attacks, potentially increasing overall organizational risk posture.
Mitigation Recommendations
1. Upgrade Claris FileMaker Server to version 22.0.4 or later, which includes the option to disable IIS short filename enumeration. 2. Configure the Windows registry key NtfsDisable8dot3NameCreation to disable 8.3 name creation on volumes hosting FileMaker Server data, preventing IIS from generating or recognizing short filenames. 3. Review IIS server configurations to limit or block HTTP requests containing tilde (~) characters if feasible, using web application firewalls or URL filtering rules. 4. Conduct regular security audits and monitoring for unusual HTTP requests that attempt to enumerate files via shortname patterns. 5. Educate system administrators about the risks of legacy 8.3 filename support and encourage disabling it where compatibility is not required. 6. Implement network segmentation and least privilege principles to limit exposure of FileMaker Server instances to untrusted networks. 7. Maintain up-to-date backups and incident response plans to quickly address any potential exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-46294: The IIS Shortname Vulnerability exploits how Microsoft IIS handles legacy 8.3 short filenames, allowing attackers to infer the existence of files or directories by crafting requests with the tilde (~) character. in Claris FileMaker Server
Description
CVE-2025-46294 is a medium-severity vulnerability affecting Claris FileMaker Server that leverages Microsoft IIS's handling of legacy 8. 3 short filenames. Attackers can exploit this by sending crafted requests containing the tilde (~) character to infer the existence of files or directories on the server, potentially revealing sensitive information. The vulnerability does not allow modification or deletion of data, nor does it require authentication or user interaction. It primarily impacts confidentiality by enabling information disclosure. FileMaker Server 22. 0. 4 addresses this issue by providing an option to disable IIS short filename enumeration via the NtfsDisable8dot3NameCreation registry setting. European organizations using vulnerable versions of FileMaker Server on IIS should apply this update promptly. Countries with significant adoption of Microsoft IIS and FileMaker Server, such as Germany, the UK, France, and the Netherlands, are more likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-46294 is a vulnerability in Claris FileMaker Server that exploits the way Microsoft Internet Information Services (IIS) handles legacy 8.3 short filenames. IIS supports backward compatibility with the 8.3 filename convention, which represents long filenames in a truncated format with a tilde (~) character. Attackers can craft HTTP requests containing the tilde character to enumerate short filenames and infer the existence of files or directories on the server. This side-channel information disclosure can reveal hidden or sensitive files that might otherwise be inaccessible or unknown to an attacker. The vulnerability does not allow direct access to file contents or modification but leaks metadata about the file system structure, which can be leveraged in further attacks such as targeted reconnaissance or privilege escalation. The issue arises because IIS responds differently to requests with valid versus invalid shortname patterns, enabling attackers to distinguish existing files. Claris addressed this vulnerability in FileMaker Server version 22.0.4 by including an installer option to disable IIS short filename enumeration through the Windows registry key NtfsDisable8dot3NameCreation. Disabling 8.3 name creation prevents IIS from generating or recognizing these legacy short filenames, mitigating the attack vector. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited confidentiality impact without integrity or availability effects. No known exploits have been reported in the wild, but the vulnerability poses a risk to organizations running vulnerable FileMaker Server versions on IIS, especially where sensitive data is stored. The CWE classification is CWE-200 (Information Exposure).
Potential Impact
For European organizations, this vulnerability primarily threatens confidentiality by allowing attackers to discover the presence of files or directories that may contain sensitive information. While it does not directly compromise data integrity or availability, the information gained can facilitate more targeted attacks, such as identifying configuration files, backup files, or proprietary data stores. Organizations using Claris FileMaker Server on Microsoft IIS are at risk, particularly if they have not applied the 22.0.4 update or disabled 8.3 name creation. This could impact sectors with sensitive data such as finance, healthcare, government, and legal services. The ease of exploitation (no authentication or user interaction required) increases the risk of opportunistic scanning and reconnaissance by attackers. However, the lack of known exploits in the wild and the medium severity score suggest the immediate risk is moderate. Still, failure to mitigate could lead to information leakage that aids in subsequent attacks, potentially increasing overall organizational risk posture.
Mitigation Recommendations
1. Upgrade Claris FileMaker Server to version 22.0.4 or later, which includes the option to disable IIS short filename enumeration. 2. Configure the Windows registry key NtfsDisable8dot3NameCreation to disable 8.3 name creation on volumes hosting FileMaker Server data, preventing IIS from generating or recognizing short filenames. 3. Review IIS server configurations to limit or block HTTP requests containing tilde (~) characters if feasible, using web application firewalls or URL filtering rules. 4. Conduct regular security audits and monitoring for unusual HTTP requests that attempt to enumerate files via shortname patterns. 5. Educate system administrators about the risks of legacy 8.3 filename support and encourage disabling it where compatibility is not required. 6. Implement network segmentation and least privilege principles to limit exposure of FileMaker Server instances to untrusted networks. 7. Maintain up-to-date backups and incident response plans to quickly address any potential exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-04-22T21:13:49.959Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6941ae5b0d5f6f4391b0c3a3
Added to database: 12/16/2025, 7:09:15 PM
Last enriched: 12/23/2025, 7:34:16 PM
Last updated: 2/7/2026, 4:41:10 AM
Views: 132
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.