CVE-2025-49760: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1809
External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network.
AI Analysis
Technical Summary
CVE-2025-49760 is a vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) related to CWE-73, which concerns external control of file name or path. Specifically, this vulnerability exists within the Windows Storage component, where an authorized attacker can manipulate file names or paths externally. This manipulation enables the attacker to perform spoofing attacks over a network. Spoofing in this context likely involves deceiving users or systems by presenting falsified file paths or names, potentially leading to misdirected file operations or trust in malicious files. The vulnerability requires the attacker to have some level of authorization (privileges) on the system and user interaction to exploit, as indicated by the CVSS vector (PR:L, UI:R). The attack vector is network-based (AV:N), meaning exploitation can occur remotely over a network. The vulnerability does not impact system integrity or availability but has a limited impact on confidentiality, as indicated by the CVSS score of 3.5 (low severity). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on July 8, 2025, with the reservation date on June 9, 2025. The issue arises from improper handling of external input controlling file paths, which can be leveraged to spoof file-related operations, potentially misleading users or automated processes in networked environments.
Potential Impact
For European organizations, this vulnerability poses a low but non-negligible risk, especially in environments where Windows 10 Version 1809 is still in use, such as legacy systems or specialized industrial setups. The spoofing capability could be exploited to trick users or systems into interacting with malicious files or resources, potentially leading to phishing, social engineering, or indirect compromise of sensitive information. While the direct confidentiality impact is limited, the spoofing could facilitate further attacks by undermining trust in file sources or network communications. Organizations with networked Windows 10 1809 endpoints, particularly those in sectors with high regulatory requirements (finance, healthcare, government), may face increased risk if attackers use this vulnerability as a foothold or part of a multi-stage attack. However, the requirement for user interaction and existing privileges reduces the likelihood of widespread exploitation. The absence of known exploits in the wild further limits immediate risk but does not preclude future exploitation attempts.
Mitigation Recommendations
Given the lack of an official patch at this time, European organizations should prioritize the following mitigations: 1) Identify and inventory all systems running Windows 10 Version 1809 to assess exposure. 2) Limit user privileges to the minimum necessary to reduce the pool of authorized attackers. 3) Educate users about the risks of interacting with unexpected or suspicious file paths and names, emphasizing caution with network-shared resources. 4) Employ network segmentation and strict access controls to reduce the attack surface and limit network-based exploitation opportunities. 5) Monitor network traffic and system logs for unusual file access patterns or spoofing indicators. 6) Plan and prioritize upgrading or patching affected systems once Microsoft releases an official fix. 7) Use endpoint protection solutions capable of detecting anomalous file operations or spoofing attempts. These steps go beyond generic advice by focusing on privilege management, user awareness, and network controls tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2025-49760: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1809
Description
External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-49760 is a vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) related to CWE-73, which concerns external control of file name or path. Specifically, this vulnerability exists within the Windows Storage component, where an authorized attacker can manipulate file names or paths externally. This manipulation enables the attacker to perform spoofing attacks over a network. Spoofing in this context likely involves deceiving users or systems by presenting falsified file paths or names, potentially leading to misdirected file operations or trust in malicious files. The vulnerability requires the attacker to have some level of authorization (privileges) on the system and user interaction to exploit, as indicated by the CVSS vector (PR:L, UI:R). The attack vector is network-based (AV:N), meaning exploitation can occur remotely over a network. The vulnerability does not impact system integrity or availability but has a limited impact on confidentiality, as indicated by the CVSS score of 3.5 (low severity). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on July 8, 2025, with the reservation date on June 9, 2025. The issue arises from improper handling of external input controlling file paths, which can be leveraged to spoof file-related operations, potentially misleading users or automated processes in networked environments.
Potential Impact
For European organizations, this vulnerability poses a low but non-negligible risk, especially in environments where Windows 10 Version 1809 is still in use, such as legacy systems or specialized industrial setups. The spoofing capability could be exploited to trick users or systems into interacting with malicious files or resources, potentially leading to phishing, social engineering, or indirect compromise of sensitive information. While the direct confidentiality impact is limited, the spoofing could facilitate further attacks by undermining trust in file sources or network communications. Organizations with networked Windows 10 1809 endpoints, particularly those in sectors with high regulatory requirements (finance, healthcare, government), may face increased risk if attackers use this vulnerability as a foothold or part of a multi-stage attack. However, the requirement for user interaction and existing privileges reduces the likelihood of widespread exploitation. The absence of known exploits in the wild further limits immediate risk but does not preclude future exploitation attempts.
Mitigation Recommendations
Given the lack of an official patch at this time, European organizations should prioritize the following mitigations: 1) Identify and inventory all systems running Windows 10 Version 1809 to assess exposure. 2) Limit user privileges to the minimum necessary to reduce the pool of authorized attackers. 3) Educate users about the risks of interacting with unexpected or suspicious file paths and names, emphasizing caution with network-shared resources. 4) Employ network segmentation and strict access controls to reduce the attack surface and limit network-based exploitation opportunities. 5) Monitor network traffic and system logs for unusual file access patterns or spoofing indicators. 6) Plan and prioritize upgrading or patching affected systems once Microsoft releases an official fix. 7) Use endpoint protection solutions capable of detecting anomalous file operations or spoofing attempts. These steps go beyond generic advice by focusing on privilege management, user awareness, and network controls tailored to the nature of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-06-09T22:49:37.620Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686d50d86f40f0eb72f91cd8
Added to database: 7/8/2025, 5:09:44 PM
Last enriched: 8/26/2025, 1:13:20 AM
Last updated: 10/7/2025, 2:35:55 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Threat Actor Deploys 'OVERSTEP' Backdoor in Ongoing SonicWall SMA Attacks
LowMicrosoft Expands Sentinel Into Agentic Security Platform With Unified Data Lake
LowUkraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs
LowRed Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover
LowNew WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.