CVE-2025-60710: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 11 Version 24H2
Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.
AI Analysis
Technical Summary
CVE-2025-60710 is a vulnerability identified in Microsoft Windows 11 Version 24H2 (build 10.0.26100.0) that involves improper link resolution before file access, also known as 'link following'. This vulnerability is classified under CWE-59, which typically involves symbolic link (symlink) or junction point handling errors that allow an attacker to manipulate file system links to access or modify files they should not. Specifically, the flaw exists in the Host Process for Windows Tasks, a core system component responsible for managing scheduled and background tasks. Due to improper validation or resolution of symbolic links before accessing files, an authorized attacker with limited privileges can exploit this to escalate their privileges locally, gaining higher system rights than intended. The CVSS v3.1 base score is 7.8, reflecting a high severity with the following vector: Attack Vector: Local (L), Attack Complexity: Low (L), Privileges Required: Low (L), User Interaction: None (N), Scope: Unchanged (U), and high impact on Confidentiality, Integrity, and Availability (all High). The exploit does not require user interaction and can be performed by an attacker who already has some level of access, making it a significant risk for insider threats or compromised accounts. As of the published date, no known exploits in the wild have been reported, and no official patches have been linked, indicating the need for vigilance and proactive mitigation. The vulnerability could be leveraged to bypass security controls, install persistent malware, or disrupt system operations.
Potential Impact
The impact of CVE-2025-60710 is substantial for organizations using Windows 11 Version 24H2. Successful exploitation allows an attacker with limited local privileges to escalate to higher privileges, potentially SYSTEM level, enabling full control over the affected system. This can lead to unauthorized access to sensitive data, modification or deletion of critical files, installation of persistent malware, and disruption of system availability. In enterprise environments, this could compromise domain-joined machines, enabling lateral movement and further network compromise. The lack of required user interaction and low complexity of attack increase the risk, especially in environments with multiple users or shared access systems. Organizations relying on Windows 11 for critical infrastructure, cloud services, or endpoint devices face increased risk of data breaches, operational disruption, and compliance violations if this vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2025-60710, organizations should immediately inventory and identify all systems running Windows 11 Version 24H2 build 10.0.26100.0. Until an official patch is released, apply the following specific mitigations: 1) Restrict local user permissions to the minimum necessary, especially limiting access to the Host Process for Windows Tasks and related directories to prevent unauthorized link creation or manipulation. 2) Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious activities related to symbolic link creation or file access anomalies. 3) Use Group Policy or security baselines to harden file system permissions and prevent unauthorized symbolic link usage. 4) Monitor event logs for unusual privilege escalation attempts or access to the Host Process for Windows Tasks. 5) Educate system administrators and users about the risks of local privilege escalation and enforce strict access controls on shared systems. 6) Once Microsoft releases a security update, prioritize testing and deployment of the patch across all affected systems. 7) Consider network segmentation and limiting administrative privileges to reduce the blast radius of potential exploitation.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil, Netherlands, Sweden, Singapore
CVE-2025-60710: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 11 Version 24H2
Description
Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-60710 is a vulnerability identified in Microsoft Windows 11 Version 24H2 (build 10.0.26100.0) that involves improper link resolution before file access, also known as 'link following'. This vulnerability is classified under CWE-59, which typically involves symbolic link (symlink) or junction point handling errors that allow an attacker to manipulate file system links to access or modify files they should not. Specifically, the flaw exists in the Host Process for Windows Tasks, a core system component responsible for managing scheduled and background tasks. Due to improper validation or resolution of symbolic links before accessing files, an authorized attacker with limited privileges can exploit this to escalate their privileges locally, gaining higher system rights than intended. The CVSS v3.1 base score is 7.8, reflecting a high severity with the following vector: Attack Vector: Local (L), Attack Complexity: Low (L), Privileges Required: Low (L), User Interaction: None (N), Scope: Unchanged (U), and high impact on Confidentiality, Integrity, and Availability (all High). The exploit does not require user interaction and can be performed by an attacker who already has some level of access, making it a significant risk for insider threats or compromised accounts. As of the published date, no known exploits in the wild have been reported, and no official patches have been linked, indicating the need for vigilance and proactive mitigation. The vulnerability could be leveraged to bypass security controls, install persistent malware, or disrupt system operations.
Potential Impact
The impact of CVE-2025-60710 is substantial for organizations using Windows 11 Version 24H2. Successful exploitation allows an attacker with limited local privileges to escalate to higher privileges, potentially SYSTEM level, enabling full control over the affected system. This can lead to unauthorized access to sensitive data, modification or deletion of critical files, installation of persistent malware, and disruption of system availability. In enterprise environments, this could compromise domain-joined machines, enabling lateral movement and further network compromise. The lack of required user interaction and low complexity of attack increase the risk, especially in environments with multiple users or shared access systems. Organizations relying on Windows 11 for critical infrastructure, cloud services, or endpoint devices face increased risk of data breaches, operational disruption, and compliance violations if this vulnerability is exploited.
Mitigation Recommendations
To mitigate CVE-2025-60710, organizations should immediately inventory and identify all systems running Windows 11 Version 24H2 build 10.0.26100.0. Until an official patch is released, apply the following specific mitigations: 1) Restrict local user permissions to the minimum necessary, especially limiting access to the Host Process for Windows Tasks and related directories to prevent unauthorized link creation or manipulation. 2) Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious activities related to symbolic link creation or file access anomalies. 3) Use Group Policy or security baselines to harden file system permissions and prevent unauthorized symbolic link usage. 4) Monitor event logs for unusual privilege escalation attempts or access to the Host Process for Windows Tasks. 5) Educate system administrators and users about the risks of local privilege escalation and enforce strict access controls on shared systems. 6) Once Microsoft releases a security update, prioritize testing and deployment of the patch across all affected systems. 7) Consider network segmentation and limiting administrative privileges to reduce the blast radius of potential exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-26T05:03:24.536Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69137c4947ab3590319da0bc
Added to database: 11/11/2025, 6:11:21 PM
Last enriched: 2/27/2026, 5:50:50 AM
Last updated: 3/26/2026, 9:35:33 AM
Views: 374
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.