Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59244: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-59244cvecve-2025-59244cwe-73
Published: Tue Oct 14 2025 (10/14/2025, 17:01:42 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/22/2026, 21:17:45 UTC

Technical Analysis

CVE-2025-59244 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw resides in the Windows Core Shell component, where an attacker can externally influence the file name or path used by the system. This manipulation allows an attacker to conduct spoofing attacks over a network, potentially misleading users or systems by presenting falsified file paths or names. The vulnerability requires no privileges but does require user interaction, such as opening a crafted file or link. The CVSS v3.1 base score is 6.5 (medium severity), reflecting a network attack vector with low attack complexity and no privileges required, but user interaction is necessary. The impact is primarily on confidentiality, with no direct effect on integrity or availability. No patches or exploits are currently publicly available, but the vulnerability is officially published and reserved by Microsoft. This issue mainly threatens legacy systems still running the initial Windows 10 release, which may be more prevalent in certain enterprise or industrial environments. The vulnerability could be leveraged to deceive users into trusting malicious files or paths, potentially leading to information disclosure or further social engineering attacks.

Potential Impact

The primary impact of CVE-2025-59244 is on confidentiality due to the potential for spoofing attacks that could trick users or systems into trusting malicious file paths or names. This could lead to unauthorized disclosure of sensitive information if users are deceived into opening or interacting with spoofed files or resources. While integrity and availability are not directly affected, the spoofing could facilitate further attacks such as phishing or malware delivery. Organizations running Windows 10 Version 1507 are at risk, especially those with legacy systems that have not been updated. The network-based attack vector and lack of privilege requirements increase the risk of exploitation, although the need for user interaction somewhat limits automated exploitation. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. Overall, the vulnerability poses a moderate risk to confidentiality and user trust in affected environments.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1507 to a supported and fully patched Windows version to eliminate exposure to this vulnerability. 2. If upgrading is not immediately possible, implement strict network segmentation and limit exposure of legacy systems to untrusted networks to reduce attack surface. 3. Educate users about the risks of interacting with unexpected or suspicious files and links, emphasizing caution to mitigate user interaction requirements for exploitation. 4. Employ endpoint security solutions that can detect and block attempts to exploit spoofing or path manipulation techniques. 5. Monitor network traffic and system logs for unusual file path or name activities that could indicate attempted exploitation. 6. Apply any available vendor advisories or interim mitigations from Microsoft once released. 7. Maintain a robust patch management process to quickly apply updates when patches become available for legacy systems. 8. Use application whitelisting and restrict execution of unauthorized files to limit the impact of spoofed files.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-11T04:30:28.169Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee858e3dd1bfb0b7e41c6a

Added to database: 10/14/2025, 5:17:02 PM

Last enriched: 2/22/2026, 9:17:45 PM

Last updated: 3/26/2026, 10:06:06 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses