PT-2025-34796 · Microsoft · Windows
Published
2025-03-18
·
Updated
2026-02-16
·
CVE-2025-9491
CVSS v2.0
6.2
6.2
Medium
| Base vector | Vector | AV:L/AC:H/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows versions prior to November 2025 updates
Description
This issue is a remote code execution vulnerability in Microsoft Windows related to the handling of LNK (shortcut) files. The vulnerability stems from a flaw in how Windows displays the contents of the 'Target:' field in the LNK file properties. Attackers can craft malicious LNK files with hidden commands embedded within the 'Target:' field, using whitespace to conceal them. This allows attackers to execute arbitrary code in the context of the current user when a user opens the malicious file. The vulnerability has been actively exploited since 2017 by multiple threat actors, including UNC6384 (a China-linked group), and has been used in attacks targeting European diplomats and governmental institutions. These attacks involve spear-phishing emails containing malicious LNK files that deploy malware such as PlugX RAT. The vulnerability was initially reported to Microsoft in March 2025, but Microsoft initially declined to address it, citing a lack of immediate risk. However, Microsoft silently mitigated the vulnerability in the November 2025 updates by ensuring that the full contents of the 'Target:' field are displayed in the file properties. The vulnerability is also known as ZDI-CAN-25373.
Recommendations
Apply the November 2025 updates to mitigate the vulnerability.
Restrict or block the use of Windows .LNK files.
Monitor for anomalous PowerShell launches triggered by LNK files.
Implement robust email filtering to detect and block malicious LNK file attachments.
Enhance user awareness training regarding the risks associated with opening LNK files from untrusted sources.
Exploit
Fix
RCE
UI Misrepresentation of Critical Information
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
BDU:2025-13635
CVE-2025-9491
ZDI-25-148
Affected Products
Windows
References · 86
- 🔥 https://virustotal.com/gui/file/a55789d49c395a9b16cb56b0544266d9ecee409fa3c5fead8082f28c2aff4e76 · Exploit
- https://bdu.fstec.ru/vul/2025-13635 · Security Note
- https://zerodayinitiative.com/advisories/ZDI-25-148 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-9491 · Security Note
- https://msrc.microsoft.com/update-guide/advisory/ADV25258226 · Vendor Advisory
- https://twitter.com/ThreatHunter_AI/status/1984319216028090447 · Twitter Post
- https://twitter.com/marcfredericgo/status/1996315616731427313 · Twitter Post
- https://twitter.com/paramdhagia/status/1996503670587076788 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1996708108358328692 · Twitter Post
- https://twitter.com/fridaysecurity/status/1984276614453375358 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1pdbhjm/microsoft_silently_patches_windows_lnk_flaw_after · Reddit Post
- https://t.me/avleonovcom/1603 · Telegram Post
- https://twitter.com/huseyin_yu63956/status/1986717405897167128 · Twitter Post
- https://twitter.com/Leila97726926/status/1997656212188635173 · Twitter Post
- https://twitter.com/arnavsharma/status/1996369999142019338 · Twitter Post