CVE-2025-33053
Internet Shortcut Files Remote Code Execution Vulnerability
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
External control of file name or path in Internet Shortcut Files allows an unauthorized attacker to execute code over a network.
| Vendor | microsoft |
| Product | windows 10 version 1507 |
| Ecosystems | |
| Industries | TechnologyEnterprise |
| Published | Jun 10, 2025 |
| Last Updated | Feb 26, 2026 |
โ ๏ธ Actively Exploited โ Act Now
Get instant alerts for microsoft windows 10 version 1507
This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2025-33053.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Microsoft / Windows 10 Version 1507
10.0.10240.0 < 10.0.10240.21034
Microsoft / Windows 10 Version 1607
10.0.14393.0 < 10.0.14393.8148
Microsoft / Windows 10 Version 1809
10.0.17763.0 < 10.0.17763.7434
Microsoft / Windows 10 Version 21H2
10.0.19044.0 < 10.0.19044.5965
Microsoft / Windows 10 Version 22H2
10.0.19045.0 < 10.0.19045.5965
Microsoft / Windows 11 version 22H2
10.0.22621.0 < 10.0.22621.5472
Microsoft / Windows 11 version 22H3
10.0.22631.0 < 10.0.22631.5472
Microsoft / Windows 11 Version 23H2
10.0.22631.0 < 10.0.22631.5472
Microsoft / Windows 11 Version 24H2
10.0.26100.0 < 10.0.26100.4349
Microsoft / Windows Server 2008 R2 Service Pack 1
6.1.7601.0 < 6.1.7601.27769
Microsoft / Windows Server 2008 R2 Service Pack 1 (Server Core installation)
6.1.7601.0 < 6.1.7601.27769
Microsoft / Windows Server 2008 Service Pack 2
6.0.6003.0 < 6.0.6003.23351
Microsoft / Windows Server 2008 Service Pack 2 (Server Core installation)
6.0.6003.0 < 6.0.6003.23351
Microsoft / Windows Server 2012
6.2.9200.0 < 6.2.9200.25522
Microsoft / Windows Server 2012 (Server Core installation)
6.2.9200.0 < 6.2.9200.25522
Microsoft / Windows Server 2012 R2
6.3.9600.0 < 6.3.9600.22620
Microsoft / Windows Server 2012 R2 (Server Core installation)
6.3.9600.0 < 6.3.9600.22620
Microsoft / Windows Server 2016
10.0.14393.0 < 10.0.14393.8148
Microsoft / Windows Server 2016 (Server Core installation)
10.0.14393.0 < 10.0.14393.8148
Microsoft / Windows Server 2019
10.0.17763.0 < 10.0.17763.7434
Microsoft / Windows Server 2019 (Server Core installation)
10.0.17763.0 < 10.0.17763.7434
Microsoft / Windows Server 2022
10.0.20348.0 < 10.0.20348.3807
Microsoft / Windows Server 2022, 23H2 Edition (Server Core installation)
10.0.25398.0 < 10.0.25398.1665
Microsoft / Windows Server 2025
10.0.26100.0 < 10.0.26100.4349
Microsoft / Windows Server 2025 (Server Core installation)
10.0.26100.0 < 10.0.26100.4349
References
msrc.microsoft.com: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33053 cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-33053 research.checkpoint.com: https://research.checkpoint.com/2025/stealth-falcon-zero-day/ darkreading.com: https://www.darkreading.com/vulnerabilities-threats/stealth-falcon-apt-exploits-microsoft-rce-zero-day-mideast therecord.media: https://therecord.media/microsoft-cisa-zero-day-turkish-defense-org bleepingcomputer.com: https://www.bleepingcomputer.com/news/security/stealth-falcon-hackers-exploited-windows-webdav-zero-day-to-drop-malware/ theregister.com: https://www.theregister.com/2025/06/10/microsoft_patch_tuesday_june/ vicarius.io: https://www.vicarius.io/vsociety/posts/cve-2025-33053-mitigation-script-remote-code-execution-vulnerability-in-microsoft-webdav vicarius.io: https://www.vicarius.io/vsociety/posts/cve-2025-33053-detection-script-remote-code-execution-vulnerability-in-microsoft-webdav