CVE-2026-25185
Received
Received - Intake
Information Disclosure in Windows Shell Link Enables Network Spoofing
Publication date: 2026-03-10
Last updated on: 2026-03-13
Assigner: Microsoft Corporation
Description
Description
Exposure of sensitive information to an unauthorized actor in Windows Shell Link Processing allows an unauthorized attacker to perform spoofing over a network.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | windows_server_2012 | r2 |
| microsoft | windows_server_2012 | * |
| microsoft | windows_10_1809 | to 10.0.17763.8511 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.8511 (exc) |
| microsoft | windows_10_21h2 | to 10.0.19044.7058 (exc) |
| microsoft | windows_10_21h2 | to 10.0.19044.7058 (exc) |
| microsoft | windows_10_21h2 | to 10.0.19044.7058 (exc) |
| microsoft | windows_10_22h2 | to 10.0.19045.7058 (exc) |
| microsoft | windows_10_22h2 | to 10.0.19045.7058 (exc) |
| microsoft | windows_10_22h2 | to 10.0.19045.7058 (exc) |
| microsoft | windows_11_23h2 | to 10.0.22631.6783 (exc) |
| microsoft | windows_11_23h2 | to 10.0.22631.6783 (exc) |
| microsoft | windows_11_24h2 | to 10.0.26100.7979 (exc) |
| microsoft | windows_11_24h2 | to 10.0.26100.7979 (exc) |
| microsoft | windows_11_25h2 | to 10.0.26200.7979 (exc) |
| microsoft | windows_11_25h2 | to 10.0.26200.7979 (exc) |
| microsoft | windows_11_26h1 | to 10.0.28000.1719 (exc) |
| microsoft | windows_11_26h1 | to 10.0.28000.1719 (exc) |
| microsoft | windows_server_2016 | to 10.0.14393.8957 (exc) |
| microsoft | windows_server_2019 | to 10.0.17763.8511 (exc) |
| microsoft | windows_server_2022 | to 10.0.20348.4830 (exc) |
| microsoft | windows_server_2022_23h2 | to 10.0.25398.2207 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8957 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8957 (exc) |
| microsoft | windows_server_2025 | to 10.0.26100.32463 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the exposure of sensitive information to an unauthorized actor through Windows Shell Link Processing. It allows an attacker who is not authorized to perform spoofing attacks over a network.
How can this vulnerability impact me? :
The vulnerability can impact you by enabling an unauthorized attacker to perform spoofing attacks over a network. This means the attacker could impersonate a trusted entity, potentially leading to deception or unauthorized access to information.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70