CVE-2025-58739: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 11 Version 25H2
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
AI Analysis
Technical Summary
CVE-2025-58739 is a vulnerability identified in Microsoft Windows 11 Version 25H2 (build 10.0.26200.0) that involves the exposure of sensitive information to unauthorized actors through Windows File Explorer. The vulnerability is classified under CWE-200, indicating an information exposure issue. Specifically, an attacker can exploit this flaw over a network to perform spoofing attacks by leveraging the leaked sensitive information. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). The exploitability is rated as unproven but official (E:U), with official remediation level (RL:O) and confirmed report confidence (RC:C). No patches have been released yet, and no known exploits are in the wild. The vulnerability allows attackers to gather sensitive information that could be used to spoof network communications, potentially leading to further attacks such as phishing or man-in-the-middle. The flaw arises from Windows File Explorer's handling of network data, which inadvertently leaks information that should remain protected. Because the attack requires user interaction, social engineering or tricking users into accessing malicious network resources may be necessary. This vulnerability highlights the importance of securing network file browsing and limiting exposure of sensitive metadata over networks.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to confidentiality of sensitive information accessed or transmitted via Windows File Explorer. Organizations with extensive use of Windows 11 25H2 in networked environments—such as enterprises, government agencies, and critical infrastructure operators—may face increased risk of targeted spoofing attacks that leverage leaked information. The exposure could facilitate phishing, credential theft, or lateral movement within networks. Although the vulnerability does not impact system integrity or availability, the confidentiality breach could lead to data leaks or compromise of trust in network communications. Sectors handling sensitive personal data (e.g., finance, healthcare, public administration) are particularly vulnerable under GDPR regulations, as unauthorized data exposure could result in regulatory penalties and reputational damage. The absence of patches and known exploits means organizations must proactively mitigate risk to prevent exploitation. The requirement for user interaction suggests that social engineering campaigns could be a vector, increasing risk in environments with less cybersecurity awareness.
Mitigation Recommendations
To mitigate CVE-2025-58739, European organizations should implement the following measures beyond generic advice: 1) Restrict network access to Windows File Explorer shares and resources, especially from untrusted or external networks, using firewalls and network segmentation. 2) Educate users about the risks of interacting with unknown or suspicious network locations and discourage opening network shares or files from unverified sources. 3) Monitor network traffic for unusual or suspicious activity indicative of spoofing attempts or information leakage. 4) Employ endpoint detection and response (EDR) tools to detect anomalous File Explorer behaviors or network connections. 5) Apply principle of least privilege to user accounts to limit exposure if exploitation occurs. 6) Stay informed on Microsoft’s patch releases and apply updates promptly once available. 7) Consider disabling or limiting network discovery and file sharing features in Windows 11 where not essential. 8) Use network-level authentication and encryption (e.g., SMB signing, IPsec) to protect file sharing traffic. These targeted actions will reduce the attack surface and limit the potential for exploitation until an official patch is released.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-58739: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 11 Version 25H2
Description
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-58739 is a vulnerability identified in Microsoft Windows 11 Version 25H2 (build 10.0.26200.0) that involves the exposure of sensitive information to unauthorized actors through Windows File Explorer. The vulnerability is classified under CWE-200, indicating an information exposure issue. Specifically, an attacker can exploit this flaw over a network to perform spoofing attacks by leveraging the leaked sensitive information. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). The exploitability is rated as unproven but official (E:U), with official remediation level (RL:O) and confirmed report confidence (RC:C). No patches have been released yet, and no known exploits are in the wild. The vulnerability allows attackers to gather sensitive information that could be used to spoof network communications, potentially leading to further attacks such as phishing or man-in-the-middle. The flaw arises from Windows File Explorer's handling of network data, which inadvertently leaks information that should remain protected. Because the attack requires user interaction, social engineering or tricking users into accessing malicious network resources may be necessary. This vulnerability highlights the importance of securing network file browsing and limiting exposure of sensitive metadata over networks.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to confidentiality of sensitive information accessed or transmitted via Windows File Explorer. Organizations with extensive use of Windows 11 25H2 in networked environments—such as enterprises, government agencies, and critical infrastructure operators—may face increased risk of targeted spoofing attacks that leverage leaked information. The exposure could facilitate phishing, credential theft, or lateral movement within networks. Although the vulnerability does not impact system integrity or availability, the confidentiality breach could lead to data leaks or compromise of trust in network communications. Sectors handling sensitive personal data (e.g., finance, healthcare, public administration) are particularly vulnerable under GDPR regulations, as unauthorized data exposure could result in regulatory penalties and reputational damage. The absence of patches and known exploits means organizations must proactively mitigate risk to prevent exploitation. The requirement for user interaction suggests that social engineering campaigns could be a vector, increasing risk in environments with less cybersecurity awareness.
Mitigation Recommendations
To mitigate CVE-2025-58739, European organizations should implement the following measures beyond generic advice: 1) Restrict network access to Windows File Explorer shares and resources, especially from untrusted or external networks, using firewalls and network segmentation. 2) Educate users about the risks of interacting with unknown or suspicious network locations and discourage opening network shares or files from unverified sources. 3) Monitor network traffic for unusual or suspicious activity indicative of spoofing attempts or information leakage. 4) Employ endpoint detection and response (EDR) tools to detect anomalous File Explorer behaviors or network connections. 5) Apply principle of least privilege to user accounts to limit exposure if exploitation occurs. 6) Stay informed on Microsoft’s patch releases and apply updates promptly once available. 7) Consider disabling or limiting network discovery and file sharing features in Windows 11 where not essential. 8) Use network-level authentication and encryption (e.g., SMB signing, IPsec) to protect file sharing traffic. These targeted actions will reduce the attack surface and limit the potential for exploitation until an official patch is released.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-03T20:46:29.258Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee858a3dd1bfb0b7e4019c
Added to database: 10/14/2025, 5:16:58 PM
Last enriched: 11/27/2025, 2:53:15 AM
Last updated: 12/2/2025, 3:20:13 PM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13876: Path Traversal in Rareprob HD Video Player All Formats App
MediumCVE-2025-13875: Path Traversal in Yohann0617 oci-helper
MediumCVE-2025-59698: n/a
HighCVE-2025-59697: n/a
UnknownCVE-2025-59696: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.