CVE-2025-59510: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1809
Improper link resolution before file access ('link following') in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to deny service locally.
AI Analysis
Technical Summary
CVE-2025-59510 is a vulnerability classified under CWE-59, which pertains to improper link resolution before file access, commonly referred to as 'link following.' This issue is present in the Windows Routing and Remote Access Service (RRAS) component on Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability allows an authorized local attacker with low privileges to exploit the improper handling of symbolic links or junction points before accessing files. By manipulating these links, the attacker can cause the RRAS service to access unintended files or directories, leading to a denial of service condition by disrupting the service's normal operation. The attack vector is local, requiring the attacker to have some level of access to the system but does not require user interaction. The vulnerability does not compromise confidentiality or integrity but impacts availability by causing service disruption. The CVSS v3.1 base score is 5.5 (medium severity), reflecting the limited scope and impact. No patches or exploits are currently publicly available, but the vulnerability is officially published and reserved by Microsoft. RRAS is often used in enterprise environments to provide VPN and routing capabilities, making this vulnerability relevant for organizations relying on legacy Windows 10 systems for network services.
Potential Impact
For European organizations, the primary impact of CVE-2025-59510 is the potential denial of service of RRAS on affected Windows 10 Version 1809 systems. This can disrupt VPN connectivity, remote access, and routing services critical for business operations, especially in sectors relying on legacy infrastructure. While the vulnerability does not expose data or allow privilege escalation, the availability impact can affect operational continuity, particularly in industries such as finance, healthcare, and government where remote access is essential. Organizations with outdated Windows 10 deployments are at higher risk, as newer versions are not affected. The disruption could lead to temporary loss of remote connectivity, impacting productivity and potentially delaying critical communications. Given the local attack vector, insider threats or compromised local accounts pose the greatest risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future exploitation.
Mitigation Recommendations
To mitigate CVE-2025-59510, European organizations should: 1) Prioritize upgrading or patching Windows 10 systems, especially those running version 1809, to supported and updated versions where this vulnerability is not present. 2) Restrict local access to systems running RRAS by enforcing strict access controls and monitoring for unauthorized local account usage. 3) Implement application whitelisting and endpoint protection to detect and prevent attempts to manipulate symbolic links or RRAS service files. 4) Regularly audit RRAS configurations and logs to identify unusual activity indicative of exploitation attempts. 5) Segment network infrastructure to limit the impact of RRAS service disruption and maintain alternative remote access methods. 6) Prepare incident response plans specifically addressing denial of service scenarios affecting remote access services. 7) Stay informed on Microsoft patch releases and apply updates promptly once available. These steps go beyond generic advice by focusing on legacy system management, local access control, and service-specific monitoring.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2025-59510: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1809
Description
Improper link resolution before file access ('link following') in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to deny service locally.
AI-Powered Analysis
Technical Analysis
CVE-2025-59510 is a vulnerability classified under CWE-59, which pertains to improper link resolution before file access, commonly referred to as 'link following.' This issue is present in the Windows Routing and Remote Access Service (RRAS) component on Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability allows an authorized local attacker with low privileges to exploit the improper handling of symbolic links or junction points before accessing files. By manipulating these links, the attacker can cause the RRAS service to access unintended files or directories, leading to a denial of service condition by disrupting the service's normal operation. The attack vector is local, requiring the attacker to have some level of access to the system but does not require user interaction. The vulnerability does not compromise confidentiality or integrity but impacts availability by causing service disruption. The CVSS v3.1 base score is 5.5 (medium severity), reflecting the limited scope and impact. No patches or exploits are currently publicly available, but the vulnerability is officially published and reserved by Microsoft. RRAS is often used in enterprise environments to provide VPN and routing capabilities, making this vulnerability relevant for organizations relying on legacy Windows 10 systems for network services.
Potential Impact
For European organizations, the primary impact of CVE-2025-59510 is the potential denial of service of RRAS on affected Windows 10 Version 1809 systems. This can disrupt VPN connectivity, remote access, and routing services critical for business operations, especially in sectors relying on legacy infrastructure. While the vulnerability does not expose data or allow privilege escalation, the availability impact can affect operational continuity, particularly in industries such as finance, healthcare, and government where remote access is essential. Organizations with outdated Windows 10 deployments are at higher risk, as newer versions are not affected. The disruption could lead to temporary loss of remote connectivity, impacting productivity and potentially delaying critical communications. Given the local attack vector, insider threats or compromised local accounts pose the greatest risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future exploitation.
Mitigation Recommendations
To mitigate CVE-2025-59510, European organizations should: 1) Prioritize upgrading or patching Windows 10 systems, especially those running version 1809, to supported and updated versions where this vulnerability is not present. 2) Restrict local access to systems running RRAS by enforcing strict access controls and monitoring for unauthorized local account usage. 3) Implement application whitelisting and endpoint protection to detect and prevent attempts to manipulate symbolic links or RRAS service files. 4) Regularly audit RRAS configurations and logs to identify unusual activity indicative of exploitation attempts. 5) Segment network infrastructure to limit the impact of RRAS service disruption and maintain alternative remote access methods. 6) Prepare incident response plans specifically addressing denial of service scenarios affecting remote access services. 7) Stay informed on Microsoft patch releases and apply updates promptly once available. These steps go beyond generic advice by focusing on legacy system management, local access control, and service-specific monitoring.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-17T03:06:33.548Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69137c4847ab3590319da085
Added to database: 11/11/2025, 6:11:20 PM
Last enriched: 11/18/2025, 7:17:18 PM
Last updated: 11/22/2025, 6:33:08 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11186: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in humanityco Cookie Notice & Compliance for GDPR / CCPA
MediumCVE-2025-2609: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in MagnusSolution MagnusBilling
HighCVE-2024-9643: CWE-489 Active Debug Code in Four-Faith F3x36
CriticalCVE-2025-65947: CWE-400: Uncontrolled Resource Consumption in jzeuzs thread-amount
HighCVE-2025-65946: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in RooCodeInc Roo-Code
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.