Skip to main content

CVE-2025-49760: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1809

Low
VulnerabilityCVE-2025-49760cvecve-2025-49760cwe-73
Published: Tue Jul 08 2025 (07/08/2025, 16:57:28 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 08/19/2025, 01:10:06 UTC

Technical Analysis

CVE-2025-49760 is a vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) related to CWE-73: External Control of File Name or Path. This vulnerability arises from improper handling of file names or paths within the Windows Storage component, allowing an authorized attacker to influence file path inputs externally. The primary security concern is that an attacker with some level of privileges (PR:L - privileges required: low) and requiring user interaction (UI:R) can exploit this flaw over a network (AV:N - attack vector: network) to perform spoofing attacks. Spoofing in this context likely means the attacker can manipulate file paths to masquerade files or directories, potentially misleading users or systems about the origin or authenticity of files. The vulnerability does not impact system integrity or availability but has a limited confidentiality impact (C:L). The CVSS v3.1 base score is 3.5, categorized as low severity. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability's exploitation requires user interaction and some privileges, limiting its ease of exploitation. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other system components. Overall, this vulnerability represents a low-severity risk primarily related to spoofing attacks via external control of file paths in Windows Storage on an older Windows 10 version.

Potential Impact

For European organizations, the impact of CVE-2025-49760 is relatively limited due to its low severity and the requirement for user interaction and privileges. However, organizations running legacy systems, specifically Windows 10 Version 1809, may be susceptible to spoofing attacks that could lead to misinformation or misrepresentation of files. This could facilitate social engineering or phishing campaigns by making malicious files appear legitimate, potentially leading to further compromise if users are deceived. Confidentiality impact is low, so direct data leakage is unlikely. Integrity and availability are not affected. The risk is higher in environments where users frequently interact with files received over the network and where privilege separation is not strictly enforced. European enterprises with extensive legacy infrastructure or those in regulated sectors with strict compliance requirements should be cautious, as even low-severity vulnerabilities can contribute to attack chains. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance.

Mitigation Recommendations

Given the lack of an official patch at this time, European organizations should implement targeted mitigations beyond generic advice: 1) Restrict use of Windows 10 Version 1809 systems by upgrading to supported, patched Windows versions to eliminate exposure. 2) Enforce strict privilege management to ensure users operate with the least privileges necessary, reducing the attack surface. 3) Educate users about the risks of interacting with unexpected or suspicious files received over the network, emphasizing caution with file names and sources. 4) Implement network-level controls to monitor and restrict suspicious file transfer activities, especially from untrusted sources. 5) Use application whitelisting and endpoint protection solutions capable of detecting anomalous file path manipulations or spoofing attempts. 6) Monitor logs for unusual file access patterns or spoofing indicators related to Windows Storage components. 7) Prepare to deploy patches promptly once Microsoft releases them, and track official advisories closely. These steps help mitigate the risk of exploitation while maintaining operational continuity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T22:49:37.620Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d86f40f0eb72f91cd8

Added to database: 7/8/2025, 5:09:44 PM

Last enriched: 8/19/2025, 1:10:06 AM

Last updated: 8/19/2025, 1:10:06 AM

Views: 36

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats