CVE-2025-9491
BaseFortify
Publication date: 2025-08-26
Last updated on: 2025-11-05
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | windows_11_23h2 | 10.0.22631.4169 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-451 | The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-9491 is a remote code execution vulnerability in Microsoft Windows involving the handling of .LNK files. The flaw allows attackers to create malicious .LNK files with hazardous content that appears invisible to users when viewed through the Windows user interface, causing UI misrepresentation. To exploit this, an attacker needs the user to interact by opening a malicious file or visiting a malicious webpage. Successful exploitation lets the attacker execute arbitrary code with the current user's privileges. [1]
How can this vulnerability impact me? :
This vulnerability can allow an attacker to execute arbitrary code on your system with the privileges of the current user if you open a malicious .LNK file or visit a malicious webpage. This can lead to unauthorized access, data theft, system compromise, or disruption of services, impacting confidentiality, integrity, and availability of your data and system. [1]
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation recommended is to restrict user interaction with potentially malicious .LNK files or applications handling them. [1]