Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60710: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows Server 2025 (Server Core installation)

0
High
VulnerabilityCVE-2025-60710cvecve-2025-60710cwe-59
Published: Tue Nov 11 2025 (11/11/2025, 17:59:25 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Server 2025 (Server Core installation)

Description

Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 01/02/2026, 23:12:35 UTC

Technical Analysis

CVE-2025-60710 is a vulnerability categorized under CWE-59 (Improper Link Resolution Before File Access, or 'Link Following') affecting Microsoft Windows Server 2025, specifically the Server Core installation version 10.0.26100.0. The flaw resides in the Host Process for Windows Tasks, which improperly resolves symbolic links or junction points before accessing files. This improper link resolution can be exploited by an authorized local attacker to escalate privileges by tricking the system into accessing or modifying files through malicious symbolic links. The vulnerability requires the attacker to have some level of local privileges (PR:L) but does not require user interaction (UI:N). The CVSS v3.1 base score is 7.8, indicating a high severity level, with impacts rated high on confidentiality, integrity, and availability. The attack vector is local, and the attack complexity is low, meaning an attacker with limited privileges can exploit this flaw to gain elevated privileges, potentially leading to full system compromise. No known public exploits or patches are currently available, but the vulnerability is publicly disclosed and assigned a CVE ID. This vulnerability is particularly relevant for environments running Windows Server 2025 in Server Core mode, which is commonly used in enterprise and cloud data centers for its minimal footprint and reduced attack surface. The improper link resolution issue could allow attackers to bypass security controls and gain unauthorized access to sensitive files or system components.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Windows Server 2025 Server Core installations in critical infrastructure, financial services, healthcare, and government sectors. Successful exploitation could lead to privilege escalation, enabling attackers to execute arbitrary code with elevated rights, access sensitive data, disrupt services, or deploy ransomware. The high impact on confidentiality, integrity, and availability could result in data breaches, operational downtime, and regulatory non-compliance under GDPR and other data protection laws. Since the attack requires local access, insider threats or attackers who have already compromised lower-privileged accounts could leverage this vulnerability to deepen their foothold. The lack of available patches increases the window of exposure, emphasizing the need for proactive mitigation. Additionally, organizations using automated deployment or orchestration tools that rely on Server Core installations may face increased risk if these tools do not enforce strict access controls.

Mitigation Recommendations

1. Enforce strict local access controls and limit administrative privileges to trusted personnel only, reducing the risk of local exploitation. 2. Implement robust monitoring and logging of file system activities, especially around symbolic link creation and modification, to detect suspicious behavior early. 3. Use application whitelisting and endpoint protection solutions that can detect and block attempts to exploit privilege escalation vulnerabilities. 4. Isolate critical servers running Windows Server 2025 Server Core from less trusted networks and users to minimize local access opportunities. 5. Prepare for rapid deployment of security patches by establishing a patch management process tailored for Server Core environments. 6. Conduct regular security audits and vulnerability assessments focusing on privilege escalation vectors and link resolution mechanisms. 7. Educate system administrators about the risks of symbolic link manipulation and the importance of secure file system configurations. 8. Consider deploying additional layers of security such as virtualization-based security or Windows Defender Credential Guard to mitigate privilege escalation impacts. 9. Restrict or monitor the use of scripting and automation tools that could be leveraged to exploit this vulnerability. 10. Engage with Microsoft support channels for updates and advisories related to this CVE.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-26T05:03:24.536Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4947ab3590319da0bc

Added to database: 11/11/2025, 6:11:21 PM

Last enriched: 1/2/2026, 11:12:35 PM

Last updated: 1/7/2026, 4:18:04 AM

Views: 246

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats