Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47956: CWE-73: External Control of File Name or Path in Microsoft Windows Security App

0
Medium
VulnerabilityCVE-2025-47956cvecve-2025-47956cwe-73
Published: Tue Jun 10 2025 (06/10/2025, 17:02:25 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Security App

Description

External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 21:12:31 UTC

Technical Analysis

CVE-2025-47956 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the Microsoft Windows Security App, specifically version 1000.0.0.0. This vulnerability allows an attacker with authorized local access to manipulate file names or paths that the Windows Security App uses, enabling spoofing attacks. Spoofing here refers to deceiving the user or the system by presenting falsified information or interfaces, potentially misleading users about the security status or alerts. The vulnerability requires low attack complexity and low privileges (local authenticated user), with no user interaction needed. The CVSS v3.1 score is 5.5 (medium severity), reflecting a high impact on confidentiality but no impact on integrity or availability. The scope remains unchanged, meaning the vulnerability affects only the Windows Security App context. No exploits have been reported in the wild, and no patches have been published as of the vulnerability disclosure date (June 10, 2025). The vulnerability arises from improper validation or sanitization of file paths or names controlled externally, which can be leveraged by attackers to trick the security app into displaying misleading information or loading malicious files under false pretenses. This could undermine user trust and potentially facilitate further local attacks or privilege escalations if combined with other vulnerabilities.

Potential Impact

The primary impact of CVE-2025-47956 is on confidentiality, as attackers can spoof the Windows Security App interface or alerts by manipulating file paths or names, potentially hiding malicious activity or misleading users about system security status. This can lead to users ignoring real threats or misconfiguring security settings. Although integrity and availability are not directly affected, the spoofing can indirectly facilitate further attacks by masking malicious behavior. The requirement for local authenticated access limits the attack surface but still poses a risk in environments where multiple users share systems or where attackers gain limited local access through other means. Organizations relying heavily on Windows Security App for endpoint protection could see reduced effectiveness of their security posture. The lack of known exploits reduces immediate risk, but the medium severity score and potential for local privilege escalation chains warrant proactive mitigation. This vulnerability could be particularly impactful in sensitive environments such as government, finance, and critical infrastructure where endpoint security is paramount.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict access controls to limit local user privileges and prevent unauthorized local access to systems running the affected Windows Security App version. Employ application whitelisting and endpoint detection and response (EDR) tools to monitor for suspicious local activities that could indicate exploitation attempts. Educate users about the risk of spoofed security alerts and encourage verification of security status through multiple channels. Regularly audit and harden local user permissions, especially on shared or multi-user systems. Monitor Microsoft security advisories closely for patch releases and apply updates promptly once available. Consider deploying additional endpoint security solutions that do not rely solely on the Windows Security App to provide layered defense. In environments with high security requirements, temporarily restrict use of the affected app or isolate vulnerable systems until remediation is possible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-14T14:13:13.464Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f521b0bd07c39389c60

Added to database: 6/10/2025, 6:54:10 PM

Last enriched: 2/21/2026, 9:12:31 PM

Last updated: 3/23/2026, 11:25:56 AM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses