Zero-day vulnerability in Windows

Spoofing attack

Not patched

Vulnerability details

Advisory: SB2025031863 - Remote code execution via misrepresented LNK file in Microsoft Windows

Vulnerable component: Windows

CVE-ID:

CVSSv3 score: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H/RL:U/RC:C

CWE-ID: CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)

Description:

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data in .lnk files. A remote attacker can hide command line arguments inside an .lnk file, trick the victim into opening it and execute arbitrary code with privileges of the current user.

Note, the vulnerability is being actively exploited in the wild.

External links:

https://www.trendmicro.com/en_us/research/25/c/windows-shortcut-zero-day-exploit.html