PT-2025-24329 · Webdav +1 · Webdav +1
Alexandra Gofman
+1
·
Published
2025-01-30
·
Updated
2025-08-30
·
CVE-2025-33053
9.0
High
Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
Microsoft Windows (affected versions not specified)
Description:
The vulnerability is related to the WebDAV protocol in Microsoft Windows, allowing an unauthorized attacker to execute code over a network by exploiting an external control of file name or path in WebDAV servers. This issue has been exploited by the Stealth Falcon APT group in a spear-phishing campaign, using .url files to execute malware from an actor-controlled WebDAV server. The attackers have targeted high-profile entities across the Middle East and Africa, including defense and government organizations. The vulnerability has been assigned a high severity score and has been patched by Microsoft in their June 2025 Patch Tuesday updates.
Recommendations:
To resolve the issue, apply the patches provided by Microsoft for the vulnerability. Monitor for suspicious activity related to WebDAV interactions and implement detection mechanisms. Regularly update systems and software for protection against known vulnerabilities. As a temporary workaround, consider restricting access to the WebDAV protocol to minimize the risk of exploitation.
Exploit
Fix
RCE
Improper Access Control
Related Identifiers
Affected Products
References · 243
- 🔥 https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept⭐ 22 🔗 6 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-33053 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/721766 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-33053 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-06677 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-33053 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-06673 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053 · Vendor Advisory
- https://github.com/DiscUtils/DiscUtils⭐ 801 🔗 187 · Note
- https://github.com/MythicC2Profiles/httpx⭐ 21 🔗 1 · Note
- https://twitter.com/MDST9999/status/1933434186699784564 · Twitter Post
- https://twitter.com/xcybersecnews/status/1933197858225737817 · Twitter Post
- https://twitter.com/threatintel/status/1933145851863736437 · Twitter Post