Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59511: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-59511cvecve-2025-59511cwe-73
Published: Tue Nov 11 2025 (11/11/2025, 17:59:18 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

External control of file name or path in Windows WLAN Service allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 11/18/2025, 19:17:31 UTC

Technical Analysis

CVE-2025-59511 is a vulnerability categorized under CWE-73 (External Control of File Name or Path) found in the Windows WLAN Service component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This flaw allows an authorized local attacker to manipulate file paths or names used by the WLAN Service, potentially causing the service to load or execute malicious files. By controlling these file paths, an attacker can escalate privileges on the affected system, gaining higher-level access than originally permitted. The vulnerability requires the attacker to have local access with some privileges (PR:L), but does not require user interaction (UI:N), making exploitation more straightforward once local access is obtained. The CVSS v3.1 base score is 7.8, reflecting high severity due to the potential for full compromise of confidentiality, integrity, and availability (C:H/I:H/A:H). The attack complexity is low (AC:L), meaning no specialized conditions are needed beyond local access. The vulnerability is currently published with no known exploits in the wild, and no patches have been linked yet, indicating organizations must monitor updates closely. The flaw affects legacy Windows 10 systems, which are still operational in many environments, especially in enterprise and industrial contexts. The WLAN Service's role in managing wireless network connectivity makes this vulnerability particularly sensitive, as it could be leveraged to gain persistent elevated privileges on affected machines.

Potential Impact

For European organizations, the impact of CVE-2025-59511 can be significant, especially in sectors relying on legacy Windows 10 Version 1809 systems such as manufacturing, healthcare, and government agencies. Successful exploitation allows an attacker with local access to escalate privileges, potentially leading to full system compromise, data theft, or disruption of critical services. This could result in breaches of sensitive personal or corporate data, operational downtime, and regulatory non-compliance under GDPR due to loss of confidentiality and integrity. The WLAN Service's involvement means attackers might also manipulate network connectivity settings, further compromising network security. Organizations with remote or hybrid workforces using older Windows 10 versions are at increased risk, as local access could be gained through compromised endpoints or insider threats. The lack of known exploits currently reduces immediate risk but also means attackers could develop exploits rapidly once details are public. The vulnerability's high impact on confidentiality, integrity, and availability underscores the need for urgent mitigation to avoid potential lateral movement or persistence by attackers within networks.

Mitigation Recommendations

1. Apply official security patches from Microsoft as soon as they become available for Windows 10 Version 1809 systems. 2. If patches are not yet released, restrict local access to affected systems by enforcing strict access controls and limiting administrative privileges. 3. Implement application whitelisting and endpoint protection solutions that monitor and block unauthorized file modifications or executions related to the WLAN Service. 4. Conduct regular audits of WLAN Service configurations and file paths to detect unauthorized changes. 5. Use network segmentation to isolate legacy systems running Windows 10 Version 1809 from critical infrastructure and sensitive data environments. 6. Enhance monitoring and logging for local privilege escalation attempts, focusing on suspicious activity involving WLAN Service processes and file operations. 7. Educate users and administrators about the risks of running outdated Windows versions and encourage timely upgrades to supported OS versions. 8. Employ endpoint detection and response (EDR) tools capable of detecting exploitation techniques related to file path manipulation and privilege escalation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-17T03:06:33.549Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4847ab3590319da088

Added to database: 11/11/2025, 6:11:20 PM

Last enriched: 11/18/2025, 7:17:31 PM

Last updated: 11/22/2025, 6:38:57 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats