Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53769: CWE-73: External Control of File Name or Path in Microsoft Windows Security App

0
Medium
VulnerabilityCVE-2025-53769cvecve-2025-53769cwe-73
Published: Tue Aug 12 2025 (08/12/2025, 17:10:38 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Security App

Description

External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.

AI-Powered Analysis

AILast updated: 10/15/2025, 17:55:25 UTC

Technical Analysis

CVE-2025-53769 is a vulnerability classified under CWE-73, which pertains to external control of file name or path. This flaw exists in the Microsoft Windows Security App version 1000.0.0.0, where an authorized local attacker can manipulate file names or paths used by the application. Such manipulation can lead to spoofing attacks, where the attacker can deceive users or systems by presenting falsified information or masquerading as legitimate files or processes. The vulnerability requires the attacker to have low-level privileges on the system (PR:L) but does not require user interaction (UI:N). The attack vector is local (AV:L), meaning the attacker must have access to the affected machine. The CVSS v3.1 base score is 5.5, indicating medium severity, with a high impact on confidentiality (C:H) but no impact on integrity or availability. The scope remains unchanged (S:U). The vulnerability is currently published with no known exploits in the wild and no patches publicly available yet. The risk arises from the potential for local attackers to spoof security-related information, possibly misleading users or security processes, which could facilitate further attacks or unauthorized access.

Potential Impact

For European organizations, this vulnerability could allow malicious insiders or compromised local accounts to spoof security alerts or files within the Windows Security App, potentially bypassing user trust and security controls. This can lead to unauthorized disclosure of sensitive information or facilitate social engineering attacks. While it does not directly compromise system integrity or availability, the confidentiality impact is significant, especially in environments handling sensitive data. Organizations with a large number of Windows endpoints running the affected version are at risk. The vulnerability could be leveraged as a stepping stone for more advanced attacks if combined with other exploits. The lack of remote exploitability limits the threat to local or physically accessible systems, but insider threats or attackers with initial footholds remain a concern.

Mitigation Recommendations

Organizations should monitor Microsoft advisories closely and apply security patches immediately once released. Until patches are available, restrict local user permissions to the minimum necessary, preventing unauthorized users from manipulating file paths or names within the Windows Security App. Employ application whitelisting and integrity monitoring to detect unauthorized changes to security app files. Conduct regular audits of local accounts and remove or disable unnecessary privileges. Educate users about potential spoofing tactics and encourage vigilance when interacting with security alerts. Consider deploying endpoint detection and response (EDR) solutions that can identify suspicious local activities related to file manipulation. Additionally, isolate critical systems to limit local access and enforce strict access controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-09T13:25:25.500Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774ead5a09ad0034927b

Added to database: 8/12/2025, 5:18:06 PM

Last enriched: 10/15/2025, 5:55:25 PM

Last updated: 10/18/2025, 12:28:35 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats