HomeVulnerabilityMicrosoft Silently Patches Home windows LNK Flaw After Years of Lively Exploitation

Microsoft Silently Patches Home windows LNK Flaw After Years of Lively Exploitation

Microsoft has silently plugged a security flaw that has been exploited by a number of menace actors since 2017 as a part of the corporate’s November 2025 Patch Tuesday updates, in line with ACROS Safety’s 0patch.

The vulnerability in query is CVE-2025-9491 (CVSS rating: 7.8/7.0), which has been described as a Home windows Shortcut (LNK) file UI misinterpretation vulnerability that would result in distant code execution.

“The particular flaw exists inside the dealing with of .LNK recordsdata,” in line with an outline within the NIST Nationwide Vulnerability Database (NVD). “Crafted knowledge in an .LNK file could cause hazardous content material within the file to be invisible to a consumer who inspects the file through the Home windows-provided consumer interface. An attacker can leverage this vulnerability to execute code within the context of the present consumer.”

Cybersecurity

In different phrases, these shortcut recordsdata are crafted such that viewing their properties in Home windows conceals the malicious instructions executed by them out of the consumer’s sight by utilizing varied “whitespace” characters. To set off their execution, attackers may disguise the recordsdata as innocent paperwork.

See also  The Teixeira leak: an ignoble betrayal of belief and an avoidable security failure

Particulars of the shortcoming first emerged in March 2025, when Development Micro’s Zero Day Initiative (ZDI) disclosed that the problem had been exploited by 11 state-sponsored teams from China, Iran, North Korea, and Russia as a part of knowledge theft, espionage, and financially motivated campaigns, a few of which date again to 2017. The difficulty can also be tracked as ZDI-CAN-25373.

At the moment, Microsoft advised The Hacker Information that the flaw doesn’t meet the bar for speedy servicing and that it’ll take into account fixing it in a future launch. It additionally identified that the LNK file format is blocked throughout Outlook, Phrase, Excel, PowerPoint, and OneNote, because of which any try and open such recordsdata will set off a warning to customers to not open recordsdata from unknown sources.

Subsequently, a report from HarfangLab discovered that the shortcoming was abused by a cyber espionage cluster often known as XDSpy to distribute a Go-based malware known as XDigo as a part of assaults concentrating on Jap European governmental entities, the identical month the flaw was publicly disclosed.

See also  Researchers Uncover Vulnerabilities in Solarman and Deye Photo voltaic Programs

Then, in late October 2025, the problem reared up a 3rd time after Arctic Wolf flagged an offensive marketing campaign through which China-affiliated menace actors weaponized the flaw in assaults aimed toward European diplomatic and authorities entities and delivered the PlugX malware.

This improvement prompted Microsoft to difficulty a proper steerage on CVE-2025-9491, reiterating its determination to not patch it and emphasizing that it does take into account it a vulnerability “as a result of consumer interplay concerned and the truth that the system already warns customers that this format is untrusted.”

0patch stated the vulnerability isn’t just about hiding the malicious a part of the command out of the Goal area, however the truth that a LNK file “permits the Goal arguments to be a really lengthy string (tens of hundreds of characters), however the Properties dialog solely reveals the primary 260 characters, silently slicing off the remaining.”

Cybersecurity

This additionally implies that a nasty actor can create an LNK file that may run an extended command, which might trigger solely the primary 260 characters of it to be exhibited to the consumer who seen its properties. The remainder of the command string is just truncated. In line with Microsoft, the file’s construction theoretically permits for strings of as much as 32k characters.

See also  Google Uncovers PROMPTFLUX Malware That Makes use of Gemini AI to Rewrite Its Code Hourly

The silent patch launched by Microsoft addresses the issue by displaying within the Properties dialog your complete Goal command with arguments, regardless of its size. That stated, this habits hinges on the likelihood that there can exist shortcut recordsdata with greater than 260 characters of their Goal area.

0patch’s micropatch for a similar flaw takes a special route by displaying a warning when customers try and open an LNK file with over 260 characters.

“Although malicious shortcuts might be constructed with fewer than 260 characters, we consider disrupting precise assaults detected within the wild could make an enormous distinction for these focused,” it stated.

The Hacker Information has reached out to Microsoft for remark, and can replace the piece if we hear again from the corporate.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular