CVE-2025-33053
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/06/2025
Last modified:
21/06/2025
Description
External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:* | 10.0.10240.21034 (excluding) | |
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:* | 10.0.10240.21034 (excluding) | |
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* | 10.0.14393.8148 (excluding) | |
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* | 10.0.14393.8148 (excluding) | |
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* | 10.0.17763.7434 (excluding) | |
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* | 10.0.17763.7434 (excluding) | |
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:* | 10.0.19044.5965 (excluding) | |
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:* | 10.0.19044.5965 (excluding) | |
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:* | 10.0.19044.5965 (excluding) | |
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:* | 10.0.19045.5965 (excluding) | |
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:* | 10.0.19045.5965 (excluding) | |
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:* | 10.0.19045.5965 (excluding) | |
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:* | 10.0.22621.5472 (excluding) | |
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:* | 10.0.22621.5472 (excluding) | |
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:* | 10.0.22631.5472 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053
- https://research.checkpoint.com/2025/stealth-falcon-zero-day/
- https://therecord.media/microsoft-cisa-zero-day-turkish-defense-org
- https://www.bleepingcomputer.com/news/security/stealth-falcon-hackers-exploited-windows-webdav-zero-day-to-drop-malware/
- https://www.darkreading.com/vulnerabilities-threats/stealth-falcon-apt-exploits-microsoft-rce-zero-day-mideast
- https://www.theregister.com/2025/06/10/microsoft_patch_tuesday_june/