Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59510: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-59510cvecve-2025-59510cwe-59
Published: Tue Nov 11 2025 (11/11/2025, 17:59:17 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Improper link resolution before file access ('link following') in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to deny service locally.

AI-Powered Analysis

AILast updated: 11/18/2025, 19:17:18 UTC

Technical Analysis

CVE-2025-59510 is a vulnerability classified under CWE-59, which pertains to improper link resolution before file access, commonly referred to as 'link following.' This issue is present in the Windows Routing and Remote Access Service (RRAS) component on Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability allows an authorized local attacker with low privileges to exploit the improper handling of symbolic links or junction points before accessing files. By manipulating these links, the attacker can cause the RRAS service to access unintended files or directories, leading to a denial of service condition by disrupting the service's normal operation. The attack vector is local, requiring the attacker to have some level of access to the system but does not require user interaction. The vulnerability does not compromise confidentiality or integrity but impacts availability by causing service disruption. The CVSS v3.1 base score is 5.5 (medium severity), reflecting the limited scope and impact. No patches or exploits are currently publicly available, but the vulnerability is officially published and reserved by Microsoft. RRAS is often used in enterprise environments to provide VPN and routing capabilities, making this vulnerability relevant for organizations relying on legacy Windows 10 systems for network services.

Potential Impact

For European organizations, the primary impact of CVE-2025-59510 is the potential denial of service of RRAS on affected Windows 10 Version 1809 systems. This can disrupt VPN connectivity, remote access, and routing services critical for business operations, especially in sectors relying on legacy infrastructure. While the vulnerability does not expose data or allow privilege escalation, the availability impact can affect operational continuity, particularly in industries such as finance, healthcare, and government where remote access is essential. Organizations with outdated Windows 10 deployments are at higher risk, as newer versions are not affected. The disruption could lead to temporary loss of remote connectivity, impacting productivity and potentially delaying critical communications. Given the local attack vector, insider threats or compromised local accounts pose the greatest risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future exploitation.

Mitigation Recommendations

To mitigate CVE-2025-59510, European organizations should: 1) Prioritize upgrading or patching Windows 10 systems, especially those running version 1809, to supported and updated versions where this vulnerability is not present. 2) Restrict local access to systems running RRAS by enforcing strict access controls and monitoring for unauthorized local account usage. 3) Implement application whitelisting and endpoint protection to detect and prevent attempts to manipulate symbolic links or RRAS service files. 4) Regularly audit RRAS configurations and logs to identify unusual activity indicative of exploitation attempts. 5) Segment network infrastructure to limit the impact of RRAS service disruption and maintain alternative remote access methods. 6) Prepare incident response plans specifically addressing denial of service scenarios affecting remote access services. 7) Stay informed on Microsoft patch releases and apply updates promptly once available. These steps go beyond generic advice by focusing on legacy system management, local access control, and service-specific monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-17T03:06:33.548Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4847ab3590319da085

Added to database: 11/11/2025, 6:11:20 PM

Last enriched: 11/18/2025, 7:17:18 PM

Last updated: 11/22/2025, 6:33:08 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats