CVE-2025-9491
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-26

Last updated on: 2025-11-05

Assigner: Zero Day Initiative

Description
Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-26
Last Modified
2025-11-05
Generated
2026-05-06
AI Q&A
2025-08-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
microsoft windows_11_23h2 10.0.22631.4169
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-451 The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-9491 is a remote code execution vulnerability in Microsoft Windows involving the handling of .LNK files. The flaw allows attackers to create malicious .LNK files with hazardous content that appears invisible to users when viewed through the Windows user interface, causing UI misrepresentation. To exploit this, an attacker needs the user to interact by opening a malicious file or visiting a malicious webpage. Successful exploitation lets the attacker execute arbitrary code with the current user's privileges. [1]


How can this vulnerability impact me? :

This vulnerability can allow an attacker to execute arbitrary code on your system with the privileges of the current user if you open a malicious .LNK file or visit a malicious webpage. This can lead to unauthorized access, data theft, system compromise, or disruption of services, impacting confidentiality, integrity, and availability of your data and system. [1]


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation recommended is to restrict user interaction with potentially malicious .LNK files or applications handling them. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart