CVE-2025-47956: CWE-73: External Control of File Name or Path in Microsoft Windows Security App
External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.
AI Analysis
Technical Summary
CVE-2025-47956 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the Microsoft Windows Security App, specifically version 1000.0.0.0. This vulnerability allows an attacker with authorized local access to manipulate file names or paths that the Windows Security App uses, enabling spoofing attacks. Spoofing here refers to deceiving the user or the system by presenting falsified information or interfaces, potentially misleading users about the security status or alerts. The vulnerability requires low attack complexity and low privileges (local authenticated user), with no user interaction needed. The CVSS v3.1 score is 5.5 (medium severity), reflecting a high impact on confidentiality but no impact on integrity or availability. The scope remains unchanged, meaning the vulnerability affects only the Windows Security App context. No exploits have been reported in the wild, and no patches have been published as of the vulnerability disclosure date (June 10, 2025). The vulnerability arises from improper validation or sanitization of file paths or names controlled externally, which can be leveraged by attackers to trick the security app into displaying misleading information or loading malicious files under false pretenses. This could undermine user trust and potentially facilitate further local attacks or privilege escalations if combined with other vulnerabilities.
Potential Impact
The primary impact of CVE-2025-47956 is on confidentiality, as attackers can spoof the Windows Security App interface or alerts by manipulating file paths or names, potentially hiding malicious activity or misleading users about system security status. This can lead to users ignoring real threats or misconfiguring security settings. Although integrity and availability are not directly affected, the spoofing can indirectly facilitate further attacks by masking malicious behavior. The requirement for local authenticated access limits the attack surface but still poses a risk in environments where multiple users share systems or where attackers gain limited local access through other means. Organizations relying heavily on Windows Security App for endpoint protection could see reduced effectiveness of their security posture. The lack of known exploits reduces immediate risk, but the medium severity score and potential for local privilege escalation chains warrant proactive mitigation. This vulnerability could be particularly impactful in sensitive environments such as government, finance, and critical infrastructure where endpoint security is paramount.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict access controls to limit local user privileges and prevent unauthorized local access to systems running the affected Windows Security App version. Employ application whitelisting and endpoint detection and response (EDR) tools to monitor for suspicious local activities that could indicate exploitation attempts. Educate users about the risk of spoofed security alerts and encourage verification of security status through multiple channels. Regularly audit and harden local user permissions, especially on shared or multi-user systems. Monitor Microsoft security advisories closely for patch releases and apply updates promptly once available. Consider deploying additional endpoint security solutions that do not rely solely on the Windows Security App to provide layered defense. In environments with high security requirements, temporarily restrict use of the affected app or isolate vulnerable systems until remediation is possible.
Affected Countries
United States, China, India, Germany, United Kingdom, France, Japan, South Korea, Canada, Australia
CVE-2025-47956: CWE-73: External Control of File Name or Path in Microsoft Windows Security App
Description
External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-47956 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the Microsoft Windows Security App, specifically version 1000.0.0.0. This vulnerability allows an attacker with authorized local access to manipulate file names or paths that the Windows Security App uses, enabling spoofing attacks. Spoofing here refers to deceiving the user or the system by presenting falsified information or interfaces, potentially misleading users about the security status or alerts. The vulnerability requires low attack complexity and low privileges (local authenticated user), with no user interaction needed. The CVSS v3.1 score is 5.5 (medium severity), reflecting a high impact on confidentiality but no impact on integrity or availability. The scope remains unchanged, meaning the vulnerability affects only the Windows Security App context. No exploits have been reported in the wild, and no patches have been published as of the vulnerability disclosure date (June 10, 2025). The vulnerability arises from improper validation or sanitization of file paths or names controlled externally, which can be leveraged by attackers to trick the security app into displaying misleading information or loading malicious files under false pretenses. This could undermine user trust and potentially facilitate further local attacks or privilege escalations if combined with other vulnerabilities.
Potential Impact
The primary impact of CVE-2025-47956 is on confidentiality, as attackers can spoof the Windows Security App interface or alerts by manipulating file paths or names, potentially hiding malicious activity or misleading users about system security status. This can lead to users ignoring real threats or misconfiguring security settings. Although integrity and availability are not directly affected, the spoofing can indirectly facilitate further attacks by masking malicious behavior. The requirement for local authenticated access limits the attack surface but still poses a risk in environments where multiple users share systems or where attackers gain limited local access through other means. Organizations relying heavily on Windows Security App for endpoint protection could see reduced effectiveness of their security posture. The lack of known exploits reduces immediate risk, but the medium severity score and potential for local privilege escalation chains warrant proactive mitigation. This vulnerability could be particularly impactful in sensitive environments such as government, finance, and critical infrastructure where endpoint security is paramount.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict access controls to limit local user privileges and prevent unauthorized local access to systems running the affected Windows Security App version. Employ application whitelisting and endpoint detection and response (EDR) tools to monitor for suspicious local activities that could indicate exploitation attempts. Educate users about the risk of spoofed security alerts and encourage verification of security status through multiple channels. Regularly audit and harden local user permissions, especially on shared or multi-user systems. Monitor Microsoft security advisories closely for patch releases and apply updates promptly once available. Consider deploying additional endpoint security solutions that do not rely solely on the Windows Security App to provide layered defense. In environments with high security requirements, temporarily restrict use of the affected app or isolate vulnerable systems until remediation is possible.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-05-14T14:13:13.464Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f521b0bd07c39389c60
Added to database: 6/10/2025, 6:54:10 PM
Last enriched: 2/21/2026, 9:12:31 PM
Last updated: 3/23/2026, 11:25:56 AM
Views: 101
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.