Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60710: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 11 Version 24H2

0
High
VulnerabilityCVE-2025-60710cvecve-2025-60710cwe-59
Published: Tue Nov 11 2025 (11/11/2025, 17:59:25 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 24H2

Description

Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:50:50 UTC

Technical Analysis

CVE-2025-60710 is a vulnerability identified in Microsoft Windows 11 Version 24H2 (build 10.0.26100.0) that involves improper link resolution before file access, also known as 'link following'. This vulnerability is classified under CWE-59, which typically involves symbolic link (symlink) or junction point handling errors that allow an attacker to manipulate file system links to access or modify files they should not. Specifically, the flaw exists in the Host Process for Windows Tasks, a core system component responsible for managing scheduled and background tasks. Due to improper validation or resolution of symbolic links before accessing files, an authorized attacker with limited privileges can exploit this to escalate their privileges locally, gaining higher system rights than intended. The CVSS v3.1 base score is 7.8, reflecting a high severity with the following vector: Attack Vector: Local (L), Attack Complexity: Low (L), Privileges Required: Low (L), User Interaction: None (N), Scope: Unchanged (U), and high impact on Confidentiality, Integrity, and Availability (all High). The exploit does not require user interaction and can be performed by an attacker who already has some level of access, making it a significant risk for insider threats or compromised accounts. As of the published date, no known exploits in the wild have been reported, and no official patches have been linked, indicating the need for vigilance and proactive mitigation. The vulnerability could be leveraged to bypass security controls, install persistent malware, or disrupt system operations.

Potential Impact

The impact of CVE-2025-60710 is substantial for organizations using Windows 11 Version 24H2. Successful exploitation allows an attacker with limited local privileges to escalate to higher privileges, potentially SYSTEM level, enabling full control over the affected system. This can lead to unauthorized access to sensitive data, modification or deletion of critical files, installation of persistent malware, and disruption of system availability. In enterprise environments, this could compromise domain-joined machines, enabling lateral movement and further network compromise. The lack of required user interaction and low complexity of attack increase the risk, especially in environments with multiple users or shared access systems. Organizations relying on Windows 11 for critical infrastructure, cloud services, or endpoint devices face increased risk of data breaches, operational disruption, and compliance violations if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2025-60710, organizations should immediately inventory and identify all systems running Windows 11 Version 24H2 build 10.0.26100.0. Until an official patch is released, apply the following specific mitigations: 1) Restrict local user permissions to the minimum necessary, especially limiting access to the Host Process for Windows Tasks and related directories to prevent unauthorized link creation or manipulation. 2) Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious activities related to symbolic link creation or file access anomalies. 3) Use Group Policy or security baselines to harden file system permissions and prevent unauthorized symbolic link usage. 4) Monitor event logs for unusual privilege escalation attempts or access to the Host Process for Windows Tasks. 5) Educate system administrators and users about the risks of local privilege escalation and enforce strict access controls on shared systems. 6) Once Microsoft releases a security update, prioritize testing and deployment of the patch across all affected systems. 7) Consider network segmentation and limiting administrative privileges to reduce the blast radius of potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-26T05:03:24.536Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4947ab3590319da0bc

Added to database: 11/11/2025, 6:11:21 PM

Last enriched: 2/27/2026, 5:50:50 AM

Last updated: 3/26/2026, 9:35:33 AM

Views: 374

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses