CVE-2025-21197

6.5 MEDIUM

📋 TL;DR

This vulnerability allows an authenticated attacker to discover file paths within restricted directories on Windows NTFS systems, even without permission to list folder contents. It affects Windows systems using NTFS file systems. The attacker must have some level of system access but can bypass intended access controls.

💻 Affected Systems

Products:
  • Windows
Versions: Specific versions not yet detailed in public advisory
Operating Systems: Windows with NTFS file system
Default Config Vulnerable: ⚠️ Yes
Notes: Requires NTFS file system; FAT32/exFAT not affected. Attacker must have some level of authenticated access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could map sensitive directory structures, identify valuable targets for further attacks, and potentially combine with other vulnerabilities for data exfiltration or privilege escalation.

🟠

Likely Case

Information disclosure about file system structure, enabling attackers to identify valuable files and plan targeted attacks against specific data.

🟢

If Mitigated

Limited information disclosure with no direct data access; attackers gain only path information without file contents.

🌐 Internet-Facing: LOW - Requires authenticated access to the system, not directly exploitable over internet without prior compromise.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could use this to map sensitive directories and identify targets for lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but appears straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21197

Restart Required: Yes

Instructions:

1. Apply latest Windows security updates from Microsoft Update. 2. For enterprise: Deploy through WSUS, SCCM, or Intune. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Restrict Access to Sensitive Directories

windows

Apply strict access controls to limit which users can access directories containing sensitive information

icacls "C:\SensitiveDirectory" /deny Users:(OI)(CI)R

Audit File System Permissions

windows

Regularly review and tighten NTFS permissions on sensitive directories

icacls "C:\*" /save perm_report.txt /T /C

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles for all user accounts
  • Monitor for unusual file system access patterns and implement enhanced logging

🔍 How to Verify

Check if Vulnerable:

Check if system is running affected Windows version with NTFS and has not applied the security update

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history shows the relevant security update installed and system has been restarted

📡 Detection & Monitoring

Log Indicators:

  • Unusual file system access patterns, repeated failed access attempts to restricted directories

Network Indicators:

  • Not network exploitable; focus on host-based detection

SIEM Query:

EventID=4663 AND ObjectType="File" AND AccessMask="ReadData" AND NOT UserName IN (authorized_users)

🔗 References

📤 Share & Export