3.5
CVE-2025-49760
- EPSS 0.31%
- Published 08.07.2025 16:57:28
- Last modified 16.07.2025 16:41:43
- Source secure@microsoft.com
- Teams watchlist Login
- Open Login
External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 HwPlatformx64 Version < 10.0.10240.21073
Microsoft ≫ Windows 10 1507 HwPlatformx86 Version < 10.0.10240.21073
Microsoft ≫ Windows 10 1607 HwPlatformx64 Version < 10.0.14393.8246
Microsoft ≫ Windows 10 1607 HwPlatformx86 Version < 10.0.14393.8246
Microsoft ≫ Windows 10 1809 HwPlatformx64 Version < 10.0.17763.7558
Microsoft ≫ Windows 10 1809 HwPlatformx86 Version < 10.0.17763.7558
Microsoft ≫ Windows 10 21h2 Version < 10.0.19044.6093
Microsoft ≫ Windows 10 22h2 Version < 10.0.19045.6093
Microsoft ≫ Windows 11 22h2 Version < 10.0.22621.5624
Microsoft ≫ Windows 11 23h2 Version < 10.0.22631.5624
Microsoft ≫ Windows 11 24h2 Version < 10.0.26100.4652
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.8246
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.7558
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.3932
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.1732
Microsoft ≫ Windows Server 2025 Version < 10.0.26100.4652
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.31% | 0.535 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secure@microsoft.com | 3.5 | 2.1 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
|
CWE-73 External Control of File Name or Path
The product allows user input to control or influence paths or file names that are used in filesystem operations.