CVE-2025-59244: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1809
External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.
AI Analysis
Technical Summary
CVE-2025-59244 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The issue resides in the Windows Core Shell component, where an attacker can externally control file names or paths. This control enables an attacker to conduct spoofing attacks over a network, potentially misleading users or systems by presenting falsified file information. The vulnerability requires no privileges (PR:N) but does require user interaction (UI:R), such as opening or interacting with a crafted file or link. The attack vector is network-based (AV:N), making remote exploitation feasible without local access. The CVSS 3.1 base score is 6.5 (medium severity), reflecting high impact on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. The exploitability is rated as functional (E:U), and remediation level is official (RL:O) with confirmed report confidence (RC:C). No patches or known exploits are currently available, indicating a window of exposure. The vulnerability could be leveraged to deceive users or systems into trusting malicious files or paths, potentially leading to data disclosure or further attacks.
Potential Impact
For European organizations, the primary impact of CVE-2025-59244 is the risk of spoofing attacks that compromise confidentiality by misleading users or automated systems about file origins or contents. This can facilitate phishing, social engineering, or data exfiltration attempts. Organizations relying on Windows 10 Version 1809, particularly in sectors handling sensitive data such as finance, healthcare, and government, face increased risk. The vulnerability does not directly affect system integrity or availability, but successful spoofing could be a stepping stone for more severe attacks. Legacy systems or environments with delayed patching cycles are especially vulnerable. The network-based attack vector means that exposed services or endpoints accessible remotely are at higher risk. Given the lack of current exploits, the threat is moderate but could escalate if weaponized. European organizations with extensive remote workforces or interconnected networks must be vigilant to prevent exploitation.
Mitigation Recommendations
1. Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported, patched Windows version to eliminate the vulnerability. 2. Restrict network exposure of systems running Windows 10 Version 1809 by limiting access to trusted networks and using firewalls to block unnecessary inbound connections. 3. Implement strict file handling policies and educate users to avoid interacting with suspicious files or links, especially those received over email or untrusted networks. 4. Employ endpoint detection and response (EDR) solutions to monitor for anomalous file path manipulations or spoofing attempts. 5. Use application whitelisting to prevent execution of unauthorized or unexpected files. 6. Regularly audit and update security configurations related to file handling and network access. 7. Monitor vendor advisories for patches or updates addressing this vulnerability and apply them promptly once available. 8. Consider network segmentation to isolate legacy systems and reduce attack surface. These measures go beyond generic advice by focusing on legacy system management, user behavior, and network controls specific to this vulnerability's characteristics.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-59244: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1809
Description
External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-59244 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The issue resides in the Windows Core Shell component, where an attacker can externally control file names or paths. This control enables an attacker to conduct spoofing attacks over a network, potentially misleading users or systems by presenting falsified file information. The vulnerability requires no privileges (PR:N) but does require user interaction (UI:R), such as opening or interacting with a crafted file or link. The attack vector is network-based (AV:N), making remote exploitation feasible without local access. The CVSS 3.1 base score is 6.5 (medium severity), reflecting high impact on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. The exploitability is rated as functional (E:U), and remediation level is official (RL:O) with confirmed report confidence (RC:C). No patches or known exploits are currently available, indicating a window of exposure. The vulnerability could be leveraged to deceive users or systems into trusting malicious files or paths, potentially leading to data disclosure or further attacks.
Potential Impact
For European organizations, the primary impact of CVE-2025-59244 is the risk of spoofing attacks that compromise confidentiality by misleading users or automated systems about file origins or contents. This can facilitate phishing, social engineering, or data exfiltration attempts. Organizations relying on Windows 10 Version 1809, particularly in sectors handling sensitive data such as finance, healthcare, and government, face increased risk. The vulnerability does not directly affect system integrity or availability, but successful spoofing could be a stepping stone for more severe attacks. Legacy systems or environments with delayed patching cycles are especially vulnerable. The network-based attack vector means that exposed services or endpoints accessible remotely are at higher risk. Given the lack of current exploits, the threat is moderate but could escalate if weaponized. European organizations with extensive remote workforces or interconnected networks must be vigilant to prevent exploitation.
Mitigation Recommendations
1. Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported, patched Windows version to eliminate the vulnerability. 2. Restrict network exposure of systems running Windows 10 Version 1809 by limiting access to trusted networks and using firewalls to block unnecessary inbound connections. 3. Implement strict file handling policies and educate users to avoid interacting with suspicious files or links, especially those received over email or untrusted networks. 4. Employ endpoint detection and response (EDR) solutions to monitor for anomalous file path manipulations or spoofing attempts. 5. Use application whitelisting to prevent execution of unauthorized or unexpected files. 6. Regularly audit and update security configurations related to file handling and network access. 7. Monitor vendor advisories for patches or updates addressing this vulnerability and apply them promptly once available. 8. Consider network segmentation to isolate legacy systems and reduce attack surface. These measures go beyond generic advice by focusing on legacy system management, user behavior, and network controls specific to this vulnerability's characteristics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-11T04:30:28.169Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee858e3dd1bfb0b7e41c6a
Added to database: 10/14/2025, 5:17:02 PM
Last enriched: 11/27/2025, 3:01:37 AM
Last updated: 12/1/2025, 10:30:51 PM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66403: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in error311 FileRise
MediumCVE-2025-66400: CWE-20: Improper Input Validation in syntax-tree mdast-util-to-hast
MediumCVE-2025-66313: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ChurchCRM CRM
MediumCVE-2025-66307: CWE-204: Observable Response Discrepancy in getgrav grav
MediumCVE-2025-66308: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in getgrav grav
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.