We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49760

Windows Storage Spoofing Vulnerability



Description

External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network.

Reserved 2025-06-09 | Published 2025-07-08 | Updated 2025-07-11 | Assigner microsoft


LOW: 3.5CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C

Problem types

CWE-73: External Control of File Name or Path

Product status

10.0.17763.0 before 10.0.17763.7558
affected

10.0.17763.0 before 10.0.17763.7558
affected

10.0.17763.0 before 10.0.17763.7558
affected

10.0.20348.0 before 10.0.20348.3932
affected

10.0.19044.0 before 10.0.19044.6093
affected

10.0.22621.0 before 10.0.22621.5624
affected

10.0.19045.0 before 10.0.19045.6093
affected

10.0.26100.0 before 10.0.26100.4652
affected

10.0.22631.0 before 10.0.22631.5624
affected

10.0.22631.0 before 10.0.22631.5624
affected

10.0.25398.0 before 10.0.25398.1732
affected

10.0.26100.0 before 10.0.26100.4652
affected

10.0.26100.0 before 10.0.26100.4652
affected

10.0.10240.0 before 10.0.10240.21073
affected

10.0.14393.0 before 10.0.14393.8246
affected

10.0.14393.0 before 10.0.14393.8246
affected

10.0.14393.0 before 10.0.14393.8246
affected

References

msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49760 (Windows Storage Spoofing Vulnerability) vendor-advisory

cve.org (CVE-2025-49760)

nvd.nist.gov (CVE-2025-49760)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49760

Support options

Helpdesk Chat, Email, Knowledgebase