PT-2025-28631 · Microsoft · Windows Storage +1

Ron Ben Yizhak

+1

·

Published

2025-07-08

·

Updated

2025-09-19

·

CVE-2025-49760

CVSS v2.0
4.0
VectorAV:N/AC:L/Au:S/C:P/I:N/A:N

**Name of the Vulnerable Software and Affected Versions:**

Windows (affected versions not specified)

**Description:**

A spoofing vulnerability exists in Windows due to improper external control of file names or paths within Windows Storage and the Remote Procedure Call (RPC) protocol. This allows an attacker to perform spoofing attacks over a network and potentially hijack trusted services, including Windows Defender’s ID. The vulnerability could enable domain privilege escalation and full Active Directory compromise. Approximately 231.6 million services are potentially affected worldwide. The issue is related to an EPM (Encrypted Protocol Message) poisoning attack technique.

**Recommendations:**

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

LPE

Weakness Enumeration

Related Identifiers

BDU:2025-08307
CVE-2025-49760

Affected Products

Windows
Windows Storage