CVE-2025-50154
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-08-12
Last updated on: 2025-10-21
Assigner: Microsoft Corporation
Description
Description
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | windows_10_1507 | to 10.0.10240.21100 (exc) |
| microsoft | windows_10_1507 | to 10.0.10240.21100 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8330 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8330 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.7678 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.7678 (exc) |
| microsoft | windows_10_21h2 | to 10.0.19044.6216 (exc) |
| microsoft | windows_10_22h2 | to 10.0.19045.6216 (exc) |
| microsoft | windows_11_22h2 | to 10.0.22621.5768 (exc) |
| microsoft | windows_11_23h2 | to 10.0.22631.5768 (exc) |
| microsoft | windows_11_24h2 | to 10.0.26100.4851 (exc) |
| microsoft | windows_server_2008 | * |
| microsoft | windows_server_2008 | * |
| microsoft | windows_server_2008 | r2 |
| microsoft | windows_server_2012 | * |
| microsoft | windows_server_2012 | r2 |
| microsoft | windows_server_2016 | to 10.0.14393.8330 (exc) |
| microsoft | windows_server_2019 | to 10.0.17763.7678 (exc) |
| microsoft | windows_server_2022 | to 10.0.20348.3989 (exc) |
| microsoft | windows_server_2022_23h2 | to 10.0.25398.1791 (exc) |
| microsoft | windows_server_2025 | to 10.0.26100.4851 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the exposure of sensitive information in Windows File Explorer, which allows an unauthorized attacker to perform spoofing attacks over a network.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability could gain access to sensitive information and use it to impersonate or spoof legitimate network entities, potentially leading to unauthorized access or deception.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70