CVE-2025-59510: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1607
Improper link resolution before file access ('link following') in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to deny service locally.
AI Analysis
Technical Summary
CVE-2025-59510 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access, or 'link following') affecting Microsoft Windows 10 Version 1607, specifically build 10.0.14393.0. The flaw exists in the Windows Routing and Remote Access Service (RRAS), a component that provides routing and remote access capabilities to Windows systems. The vulnerability allows an attacker with authorized local access and limited privileges to exploit improper symbolic link resolution before file access operations within RRAS. By manipulating symbolic links, the attacker can cause the RRAS service to access unintended files or paths, leading to a denial of service condition. This DoS can disrupt network routing and remote access functionalities, potentially impacting network availability for affected systems. The CVSS v3.1 base score is 5.5 (medium severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), and privileges (PR:L), but no user interaction (UI:N). The impact is limited to availability (A:H) with no confidentiality or integrity loss. No known exploits are currently in the wild, and no patches have been explicitly linked yet. The vulnerability is relevant primarily to legacy Windows 10 systems still running version 1607, which is an older release from 2016. This limits the scope but remains critical for environments that have not upgraded or decommissioned these systems, especially where RRAS is actively used for network services.
Potential Impact
For European organizations, the primary impact of CVE-2025-59510 is the potential disruption of network routing and remote access services due to denial of service attacks. This can affect business continuity, especially in sectors relying on legacy Windows 10 systems with RRAS enabled, such as industrial control systems, government networks, or enterprises with legacy infrastructure. The vulnerability does not expose sensitive data or allow privilege escalation but can cause service outages that interrupt operations. Organizations with strict uptime requirements or those providing critical network services may face operational and reputational risks. Since exploitation requires local access and privileges, insider threats or compromised user accounts pose the main risk vectors. The lack of known public exploits reduces immediate threat but does not eliminate the risk of targeted attacks or future exploit development.
Mitigation Recommendations
1. Upgrade affected systems from Windows 10 Version 1607 to a supported and patched Windows version to eliminate the vulnerability. 2. If upgrading is not immediately feasible, disable the Routing and Remote Access Service (RRAS) on affected systems if it is not essential. 3. Restrict local access to systems running RRAS to trusted administrators only, minimizing the risk of local exploitation. 4. Implement strict access controls and monitoring on accounts with local privileges to detect suspicious activity. 5. Employ application whitelisting and endpoint protection to prevent unauthorized execution of malicious code that could exploit this vulnerability. 6. Regularly audit and review legacy systems and services to identify and remediate outdated software components. 7. Monitor vendor advisories for patches or updates addressing this vulnerability and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2025-59510: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1607
Description
Improper link resolution before file access ('link following') in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to deny service locally.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-59510 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access, or 'link following') affecting Microsoft Windows 10 Version 1607, specifically build 10.0.14393.0. The flaw exists in the Windows Routing and Remote Access Service (RRAS), a component that provides routing and remote access capabilities to Windows systems. The vulnerability allows an attacker with authorized local access and limited privileges to exploit improper symbolic link resolution before file access operations within RRAS. By manipulating symbolic links, the attacker can cause the RRAS service to access unintended files or paths, leading to a denial of service condition. This DoS can disrupt network routing and remote access functionalities, potentially impacting network availability for affected systems. The CVSS v3.1 base score is 5.5 (medium severity), reflecting that the attack vector is local (AV:L), requires low attack complexity (AC:L), and privileges (PR:L), but no user interaction (UI:N). The impact is limited to availability (A:H) with no confidentiality or integrity loss. No known exploits are currently in the wild, and no patches have been explicitly linked yet. The vulnerability is relevant primarily to legacy Windows 10 systems still running version 1607, which is an older release from 2016. This limits the scope but remains critical for environments that have not upgraded or decommissioned these systems, especially where RRAS is actively used for network services.
Potential Impact
For European organizations, the primary impact of CVE-2025-59510 is the potential disruption of network routing and remote access services due to denial of service attacks. This can affect business continuity, especially in sectors relying on legacy Windows 10 systems with RRAS enabled, such as industrial control systems, government networks, or enterprises with legacy infrastructure. The vulnerability does not expose sensitive data or allow privilege escalation but can cause service outages that interrupt operations. Organizations with strict uptime requirements or those providing critical network services may face operational and reputational risks. Since exploitation requires local access and privileges, insider threats or compromised user accounts pose the main risk vectors. The lack of known public exploits reduces immediate threat but does not eliminate the risk of targeted attacks or future exploit development.
Mitigation Recommendations
1. Upgrade affected systems from Windows 10 Version 1607 to a supported and patched Windows version to eliminate the vulnerability. 2. If upgrading is not immediately feasible, disable the Routing and Remote Access Service (RRAS) on affected systems if it is not essential. 3. Restrict local access to systems running RRAS to trusted administrators only, minimizing the risk of local exploitation. 4. Implement strict access controls and monitoring on accounts with local privileges to detect suspicious activity. 5. Employ application whitelisting and endpoint protection to prevent unauthorized execution of malicious code that could exploit this vulnerability. 6. Regularly audit and review legacy systems and services to identify and remediate outdated software components. 7. Monitor vendor advisories for patches or updates addressing this vulnerability and apply them promptly once available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-17T03:06:33.548Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69137c4847ab3590319da085
Added to database: 11/11/2025, 6:11:20 PM
Last enriched: 2/14/2026, 7:17:12 AM
Last updated: 3/25/2026, 4:26:14 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.