PT-2025-34796 · Microsoft · Windows
Published
2025-03-18
·
Updated
2026-02-01
·
CVE-2025-9491
CVSS v2.0
6.2
6.2
Medium
| Base vector | Vector | AV:L/AC:H/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows versions (affected versions not specified)
Description
This issue is a remote code execution vulnerability in the handling of Windows LNK (shortcut) files. Attackers can craft malicious LNK files with hidden command-line arguments, exploiting a UI misrepresentation to conceal potentially harmful content. This allows attackers to execute code in the context of the current user when a user opens the malicious file. The vulnerability has been actively exploited since 2017 by multiple threat actors, including UNC6384 (a China-linked group), and APT groups from North Korea, Iran, Russia, and China. Real-world attacks have targeted European diplomats, using spear-phishing emails with malicious LNK files disguised as meeting invitations. These files deploy malware such as PlugX RAT through techniques like PowerShell obfuscation and DLL side-loading. The vulnerability involves whitespace padding in the 'Target' field of LNK files, allowing malicious commands to be hidden beyond the initially displayed 260 characters. The API Endpoint used in attacks involves the opening of malicious .LNK files. The vulnerable variable is the 'Target' field within the LNK file.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
RCE
UI Misrepresentation of Critical Information
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-13635
CVE-2025-9491
ZDI-25-148
Affected Products
Windows
References · 84
- 🔥 https://virustotal.com/gui/file/a55789d49c395a9b16cb56b0544266d9ecee409fa3c5fead8082f28c2aff4e76 · Exploit
- https://msrc.microsoft.com/update-guide/advisory/ADV25258226 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-13635 · Security Note
- https://zerodayinitiative.com/advisories/ZDI-25-148 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-9491 · Security Note
- https://t.me/secharvester/20506 · Telegram Post
- https://twitter.com/JensHilbig/status/1996546823675150354 · Twitter Post
- https://twitter.com/huseyin_yu63956/status/1986717405897167128 · Twitter Post
- https://twitter.com/TheHackersNews/status/1984258895666385381 · Twitter Post
- https://twitter.com/transilienceai/status/1997184347326042142 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1opw0fs/top_10_trending_cves_06112025 · Reddit Post
- https://twitter.com/malwrhunterteam/status/1984224863603851388 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1oozx04/top_10_trending_cves_05112025 · Reddit Post
- https://twitter.com/blueteamsec1/status/2007975722745524483 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1oo4ipo/top_10_trending_cves_04112025 · Reddit Post