Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59511: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-59511cvecve-2025-59511cwe-73
Published: Tue Nov 11 2025 (11/11/2025, 17:59:18 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

External control of file name or path in Windows WLAN Service allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:45:30 UTC

Technical Analysis

CVE-2025-59511 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the Windows WLAN Service component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This flaw allows an authorized local attacker to manipulate file paths or names used by the WLAN Service, potentially causing the service to load or write to unintended files. By exploiting this, an attacker can escalate privileges locally, gaining higher system rights than originally granted. The vulnerability does not require user interaction but does require the attacker to have some level of local access (low privileges). The CVSS v3.1 score of 7.8 indicates high severity, with impacts rated as high on confidentiality, integrity, and availability. The vulnerability is exploitable with low attack complexity and no user interaction, but it requires privileges. There are no known exploits in the wild yet, and no official patches have been linked at the time of publication. The flaw arises from improper validation or control over file paths used by the WLAN Service, which can be influenced externally by an attacker with local access. This can lead to arbitrary file operations, enabling privilege escalation and potentially full system compromise. Given the widespread use of Windows 10 Version 1809 in enterprise and industrial environments, this vulnerability poses a significant risk if left unmitigated.

Potential Impact

The primary impact of CVE-2025-59511 is local privilege escalation, allowing attackers with limited access to gain administrative or SYSTEM-level privileges. This can lead to complete system takeover, enabling attackers to install malware, steal sensitive data, or disrupt system operations. The vulnerability affects confidentiality, integrity, and availability, as attackers can manipulate system files or configurations. Organizations relying on Windows 10 Version 1809, especially in critical infrastructure, government, and enterprise environments, face increased risk of targeted attacks. The lack of known exploits currently provides a window for proactive mitigation, but the ease of exploitation and high impact make this a serious threat. Systems that remain unpatched or unmitigated could be compromised by insider threats or attackers who gain initial foothold through other means. The vulnerability could also be chained with other exploits to facilitate lateral movement and persistence within networks.

Mitigation Recommendations

1. Immediately inventory and identify all systems running Windows 10 Version 1809 (build 10.0.17763.0) within your environment. 2. Monitor official Microsoft channels for patches or security updates addressing CVE-2025-59511 and apply them promptly once available. 3. Until patches are released, restrict local user privileges to the minimum necessary, especially limiting access to WLAN Service components or related system files. 4. Employ application whitelisting and endpoint protection solutions to detect and block suspicious file operations or privilege escalation attempts. 5. Use system integrity monitoring tools to detect unauthorized changes to critical files or configurations related to WLAN Service. 6. Enforce strict access controls and audit logging on systems to detect anomalous local activities indicative of exploitation attempts. 7. Educate system administrators and security teams about this vulnerability to ensure rapid response and containment if exploitation is suspected. 8. Consider upgrading affected systems to a more recent, supported Windows version where this vulnerability is not present or has been patched. 9. Implement network segmentation to limit the impact of a compromised host and reduce the risk of lateral movement. 10. Regularly review and update local privilege assignments to minimize the attack surface for privilege escalation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-17T03:06:33.549Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4847ab3590319da088

Added to database: 11/11/2025, 6:11:20 PM

Last enriched: 2/27/2026, 5:45:30 AM

Last updated: 3/21/2026, 9:56:35 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses