CVE-2025-59214
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-10-14
Last updated on: 2026-03-27
Assigner: Microsoft Corporation
Description
Description
Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | windows_10_1507 | to 10.0.10240.21161 (exc) |
| microsoft | windows_10_1507 | to 10.0.10240.21161 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8519 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8519 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.7919 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.7919 (exc) |
| microsoft | windows_10_21h2 | to 10.0.19044.6456 (exc) |
| microsoft | windows_10_22h2 | to 10.0.19045.6456 (exc) |
| microsoft | windows_11_22h2 | to 10.0.22621.6060 (exc) |
| microsoft | windows_11_23h2 | to 10.0.22631.6060 (inc) |
| microsoft | windows_11_24h2 | to 10.0.26100.6899 (exc) |
| microsoft | windows_11_25h2 | to 10.0.26200.6899 (exc) |
| microsoft | windows_server_2008 | * |
| microsoft | windows_server_2008 | * |
| microsoft | windows_server_2008 | r2 |
| microsoft | windows_server_2012 | * |
| microsoft | windows_server_2012 | r2 |
| microsoft | windows_server_2016 | to 10.0.14393.8519 (inc) |
| microsoft | windows_server_2019 | to 10.0.17763.7919 (exc) |
| microsoft | windows_server_2022 | to 10.0.20348.4294 (exc) |
| microsoft | windows_server_2022_23h2 | to 10.0.25398.1913 (exc) |
| microsoft | windows_server_2025 | to 10.0.26100.6899 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the exposure of sensitive information to an unauthorized actor through Windows File Explorer, which allows an attacker to perform spoofing attacks over a network.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability could gain access to sensitive information without authorization and use it to spoof or impersonate legitimate network entities, potentially leading to security breaches.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70