Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20925: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1607

0
Medium
VulnerabilityCVE-2026-20925cvecve-2026-20925cwe-73
Published: Tue Jan 13 2026 (01/13/2026, 17:56:41 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/22/2026, 21:40:31 UTC

Technical Analysis

CVE-2026-20925 is a vulnerability categorized under CWE-73 (External Control of File Name or Path) affecting Microsoft Windows 10 Version 1607, specifically build 10.0.14393.0. The vulnerability arises from improper handling of file names or paths controlled externally within the NTLM authentication protocol. NTLM, a legacy authentication protocol used in Windows environments, can be manipulated by an attacker to perform spoofing attacks over a network. This means an attacker can craft malicious requests or resources that cause the system to reference or load unintended files or paths, potentially leading to unauthorized disclosure of sensitive information. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts confidentiality (C:H) without affecting integrity or availability. The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting this is a newly disclosed vulnerability. The vulnerability was reserved in December 2025 and published in January 2026. Given the age of Windows 10 Version 1607, many organizations may still have systems running this build, especially in legacy or industrial environments. The flaw could be exploited by attackers to spoof network identities or resources, potentially leading to data leakage or unauthorized access to network services relying on NTLM authentication.

Potential Impact

The primary impact of this vulnerability is on confidentiality, as attackers can exploit the external control of file names or paths to perform spoofing attacks that may lead to unauthorized disclosure of sensitive information. While integrity and availability are not directly affected, the ability to spoof network resources can facilitate further attacks such as man-in-the-middle or credential theft. Organizations using Windows 10 Version 1607 with NTLM enabled are at risk, particularly in environments where legacy authentication protocols remain in use due to compatibility requirements. This vulnerability could be leveraged in targeted attacks against enterprises, government agencies, or critical infrastructure relying on older Windows systems. The medium severity rating reflects the moderate risk posed by the vulnerability, considering the need for user interaction and the absence of privilege requirements. However, the widespread use of Windows 10 and NTLM in many organizations globally means the potential attack surface is significant. Exploitation could undermine trust in network authentication and lead to lateral movement within compromised networks.

Mitigation Recommendations

To mitigate CVE-2026-20925, organizations should first assess their environment for the presence of Windows 10 Version 1607 systems and prioritize upgrading to supported, patched versions of Windows 10 or later. Where upgrading is not immediately feasible, disabling NTLM authentication or restricting its use through Group Policy can reduce exposure, as NTLM is the protocol exploited by this vulnerability. Network segmentation and the use of strong authentication protocols such as Kerberos should be enforced to limit the impact of spoofing attempts. Implementing network-level monitoring and intrusion detection systems to identify anomalous NTLM traffic or spoofing indicators can provide early warning of exploitation attempts. User education to recognize and avoid interacting with suspicious network resources or links can reduce the risk posed by the required user interaction. Organizations should monitor for official patches or updates from Microsoft and apply them promptly once available. Additionally, applying strict access controls on file shares and network resources can limit the potential for attackers to leverage this vulnerability effectively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-04T20:04:16.335Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668ae3a60475309f9ae1cf

Added to database: 1/13/2026, 6:11:47 PM

Last enriched: 2/22/2026, 9:40:31 PM

Last updated: 3/25/2026, 9:08:06 PM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses