Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49680: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-49680cvecve-2025-49680cwe-59
Published: Tue Jul 08 2025 (07/08/2025, 16:57:55 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Improper link resolution before file access ('link following') in Windows Performance Recorder allows an authorized attacker to deny service locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:21:12 UTC

Technical Analysis

CVE-2025-49680 is a vulnerability identified in Microsoft Windows 10 Version 1507 (build 10.0.10240.0) affecting the Windows Performance Recorder (WPR) component. The issue stems from improper link resolution before file access, a classic 'link following' flaw categorized as CWE-59. This vulnerability allows an authorized local attacker—someone with limited privileges and requiring user interaction—to manipulate symbolic links in a way that causes the WPR to access unintended files or directories. The consequence of this flaw is a denial of service (DoS) condition, potentially disrupting system operations by corrupting or blocking access to critical files or causing application crashes. The CVSS v3.1 base score is 7.3, reflecting a high severity due to the combined impact on confidentiality, integrity, and availability, as well as the relatively low attack complexity and privileges required. Although no exploits have been reported in the wild, the vulnerability poses a significant risk to systems still running this outdated Windows 10 version, which is no longer supported by Microsoft. The lack of available patches further elevates the threat, emphasizing the need for alternative mitigations. The vulnerability’s exploitation requires local access and user interaction, limiting remote exploitation but still posing a risk in environments where users have local access or where attackers can trick users into triggering the flaw.

Potential Impact

For European organizations, the impact of CVE-2025-49680 can be substantial, particularly in sectors relying on legacy Windows 10 Version 1507 systems. The denial of service condition can disrupt critical business processes, leading to downtime and potential data loss. The vulnerability affects confidentiality, integrity, and availability, meaning sensitive data could be exposed or corrupted, and system stability compromised. Organizations with strict uptime requirements, such as financial institutions, healthcare providers, and industrial control systems, may experience operational interruptions. Additionally, the need for local access and user interaction means insider threats or social engineering attacks could leverage this vulnerability. The absence of patches increases the risk profile, as organizations must rely on compensating controls. The vulnerability also complicates compliance with European data protection regulations like GDPR if service disruptions lead to data breaches or loss of data integrity.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement several specific mitigations: 1) Restrict access to Windows Performance Recorder by limiting user permissions and applying strict access controls to prevent unauthorized use. 2) Monitor and audit symbolic link creation and file access patterns to detect suspicious activity indicative of exploitation attempts. 3) Educate users about the risks of interacting with untrusted content or executing unknown processes that could trigger the vulnerability. 4) Employ application whitelisting to prevent unauthorized execution of tools or scripts that might exploit the flaw. 5) Where feasible, upgrade affected systems to a supported and patched Windows version to eliminate the vulnerability entirely. 6) Use endpoint detection and response (EDR) solutions to identify and respond to anomalous local activity related to WPR. 7) Implement network segmentation to limit the spread of potential attacks originating from compromised local accounts. These targeted measures go beyond generic advice and address the specific exploitation vector of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T17:28:52.664Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d66f40f0eb72f91c07

Added to database: 7/8/2025, 5:09:42 PM

Last enriched: 2/14/2026, 10:21:12 AM

Last updated: 3/28/2026, 9:11:17 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses