CVE-2025-48799
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-07-08
Last updated on: 2025-09-26
Assigner: Microsoft Corporation
Description
Description
Improper link resolution before file access ('link following') in Windows Update Service allows an authorized attacker to elevate privileges locally.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | windows_10_1607 | to 10.0.14393.8246 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8246 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.7558 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.7558 (exc) |
| microsoft | windows_10_21h2 | to 10.0.19044.6093 (exc) |
| microsoft | windows_10_22h2 | to 10.0.19045.6093 (exc) |
| microsoft | windows_11_22h2 | to 10.0.22621.5624 (exc) |
| microsoft | windows_11_23h2 | to 10.0.22631.5624 (exc) |
| microsoft | windows_11_24h2 | to 10.0.26100.4652 (exc) |
| microsoft | windows_server_2025 | to 10.0.26100.4652 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-59 | The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves improper link resolution before file access in the Windows Update Service. It allows an authorized attacker to exploit 'link following' to elevate their privileges locally on the affected system.
How can this vulnerability impact me? :
An attacker with local authorized access could use this vulnerability to gain higher privileges than intended, potentially leading to full control over the affected system, including the ability to modify, delete, or access sensitive data.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70