Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59244: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-59244cvecve-2025-59244cwe-73
Published: Tue Oct 14 2025 (10/14/2025, 17:01:42 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 01/02/2026, 22:53:09 UTC

Technical Analysis

CVE-2025-59244 is a vulnerability categorized under CWE-73 (External Control of File Name or Path) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw resides in the Windows Core Shell component, which handles file and path operations. An attacker can exploit this vulnerability remotely over a network without requiring privileges but needs user interaction, such as convincing a user to open a malicious file or link. By externally controlling the file name or path, the attacker can perform spoofing attacks that may deceive users or systems into trusting malicious files or locations. This can lead to confidentiality breaches by exposing users to phishing or malware delivery vectors masquerading as legitimate files or paths. The CVSS v3.1 score is 6.5 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction. The vulnerability does not impact integrity or availability directly. No patches have been published yet, and no known exploits are reported in the wild. Given the affected Windows version is relatively old (1809), many organizations may still run it in legacy environments, increasing exposure risk. The vulnerability highlights the importance of controlling external inputs that influence file path handling to prevent spoofing and related attacks.

Potential Impact

For European organizations, the primary impact of CVE-2025-59244 is the increased risk of spoofing attacks that can lead to phishing, social engineering, or malware infection through deceptive file paths or names. Confidentiality is at risk as attackers may trick users into opening malicious files or links that appear legitimate. This can compromise sensitive information or lead to further exploitation. Since the vulnerability requires user interaction, the risk is higher in environments with less security awareness or where users frequently handle external files or network shares. Organizations relying on Windows 10 Version 1809, especially in sectors like finance, healthcare, and critical infrastructure, may face targeted attacks exploiting this flaw. The lack of patches and known exploits currently limits immediate widespread impact but also means organizations must proactively mitigate risks. Legacy systems and delayed patching practices common in some European enterprises increase vulnerability exposure. Overall, the threat could facilitate initial access or lateral movement in targeted attacks, undermining organizational security posture.

Mitigation Recommendations

1. Limit user interaction with untrusted files and network resources by enforcing strict policies on opening email attachments and downloading files from unknown sources. 2. Implement application whitelisting and restrict execution of files from untrusted or temporary directories to reduce the chance of malicious file execution. 3. Use network segmentation and firewall rules to limit exposure of legacy Windows 10 Version 1809 systems to untrusted networks. 4. Enhance user awareness training focusing on recognizing spoofed file names and phishing attempts that exploit this vulnerability. 5. Monitor network and endpoint logs for suspicious file path manipulations or unexpected file access patterns. 6. Prepare for rapid deployment of official patches once Microsoft releases them by maintaining an up-to-date asset inventory and patch management process. 7. Where feasible, upgrade affected systems to newer, supported Windows versions that do not have this vulnerability. 8. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous file system activities related to path spoofing.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-11T04:30:28.169Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858e3dd1bfb0b7e41c6a

Added to database: 10/14/2025, 5:17:02 PM

Last enriched: 1/2/2026, 10:53:09 PM

Last updated: 1/18/2026, 3:56:33 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats