PT-2025-24329 · Webdav +1 · Webdav +1
Alexandra Gofman
+1
·
Published
2025-01-30
·
Updated
2025-10-16
·
CVE-2025-33053
CVSS v2.0
10
10
High
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows versions prior to the June 2025 Patch Tuesday update
Description
A remote code execution vulnerability exists in the Web Distributed Authoring and Versioning (WebDAV) component of Microsoft Windows. This flaw allows an attacker to execute arbitrary code on a system by exploiting improper handling of file paths and names, specifically through specially crafted .url files. The vulnerability has been actively exploited by the Stealth Falcon APT group in targeted attacks, particularly against defense and government organizations in the Middle East and Africa. The attackers utilized this vulnerability to deploy malware, including the Horus Agent, by manipulating the working directory of legitimate Windows tools. The vulnerability is triggered when a user clicks on a malicious link. It is estimated that this vulnerability has been exploited since March 2025. The API endpoint used in the attacks involves the exploitation of the
iediagcmd.exe
executable. The vulnerability leverages the manipulation of the WorkingDirectory
parameter within the .url file to point to a malicious WebDAV server.Recommendations
Apply the June 2025 Patch Tuesday updates to all affected systems to address CVE-2025-33053.
Exploit
Fix
RCE
Improper Access Control
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-06673
BDU:2025-06677
CVE-2025-33053
Affected Products
Webdav
Windows
References · 247
- 🔥 https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept⭐ 22 🔗 6 · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-33053-detection-script-remote-code-execution-vulnerability-in-microsoft-webdav · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-33053-mitigation-script-remote-code-execution-vulnerability-in-microsoft-webdav · Exploit
- 🔥 https://research.checkpoint.com/2025/stealth-falcon-zero-day · Exploit
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-33053 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-06677 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-33053 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/721766 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33073 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-33053 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-06673 · Security Note
- https://github.com/DiscUtils/DiscUtils⭐ 801 🔗 187 · Note
- https://github.com/MythicC2Profiles/httpx⭐ 21 🔗 1 · Note