Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25177: CWE-641: Improper Restriction of Names for Files and Other Resources in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2026-25177cvecve-2026-25177cwe-641
Published: Tue Mar 10 2026 (03/10/2026, 17:04:54 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:31:43 UTC

Technical Analysis

CVE-2026-25177 is a vulnerability classified under CWE-641 (Improper Restriction of Names for Files and Other Resources) affecting Microsoft Windows 10 Version 1607 (build 10.0.14393.0). The flaw exists within Active Directory Domain Services (AD DS), where improper validation or restriction of resource names allows an authorized attacker with limited privileges on the network to escalate their privileges. Specifically, the vulnerability enables an attacker to manipulate file or resource names in a way that bypasses intended access controls or restrictions, potentially overwriting or gaining unauthorized access to critical system files or resources. This can lead to full compromise of the affected system's confidentiality, integrity, and availability. The CVSS v3.1 base score is 8.8, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The vulnerability was reserved in January 2026 and published in March 2026. No public exploits are known yet, but the vulnerability's characteristics suggest it could be exploited in targeted attacks against legacy Windows 10 environments. The lack of patch links indicates that a fix may not yet be publicly available, emphasizing the need for interim mitigations.

Potential Impact

The vulnerability allows an attacker with some level of authorized access on the network to elevate their privileges significantly, potentially gaining administrative control over affected systems. This can lead to unauthorized access to sensitive data, disruption of services, and the ability to deploy further attacks such as lateral movement within an enterprise network. Organizations relying on Windows 10 Version 1607 and Active Directory Domain Services are particularly at risk, especially if they have not upgraded to newer Windows versions or applied mitigations. The impact spans confidentiality (data exposure), integrity (unauthorized modification of files and configurations), and availability (potential service disruption). Given the network attack vector and no requirement for user interaction, exploitation could be automated or performed remotely by attackers with limited privileges, increasing the threat to enterprise environments globally.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1607 to a supported and patched version of Windows 10 or later to eliminate the vulnerability. 2. Implement strict privilege management to limit the number of users with elevated privileges on the network, reducing the attack surface. 3. Enforce network segmentation and access controls to restrict access to Active Directory Domain Services to only trusted and necessary systems. 4. Monitor Active Directory logs and network traffic for unusual activity that could indicate exploitation attempts, such as unexpected privilege escalations or resource name manipulations. 5. Apply principle of least privilege for service accounts and users interacting with AD DS. 6. If patching is not immediately possible, consider deploying application whitelisting and enhanced endpoint detection and response (EDR) solutions to detect and block suspicious activities related to resource name manipulation. 7. Regularly review and update security policies related to file and resource naming conventions within the enterprise environment to prevent exploitation of naming weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-01-29T18:36:49.695Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0562dea502d3aa87d6a35

Added to database: 3/10/2026, 5:34:37 PM

Last enriched: 3/10/2026, 6:31:43 PM

Last updated: 3/14/2026, 12:49:25 AM

Views: 530

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses