Wednesday, April 23, 2025
HomeCVE/vulnerability0-Day Vulnerability in Windows Storage Allow Hackers to Delete the Target Files...

0-Day Vulnerability in Windows Storage Allow Hackers to Delete the Target Files Remotely

Published on

SIEM as a Service

Follow Us on Google News

A newly discovered 0-day vulnerability in Windows Storage has sent shockwaves through the cybersecurity community.

Identified as CVE-2025-21391, this critical flaw allows attackers to elevate privilege and remotely delete targeted files on a victim’s system without their interaction. Microsoft officially confirmed the issue on February 11, 2025.

According to the advisory, this vulnerability stems from a weakness categorized under CWE-59: Improper Link Resolution Before File Access (‘Link Following’).

- Advertisement - Google News

If exploited successfully, threat actors with low-level privileges may elevate their access and compromise the integrity and availability of the system, deleting critical files remotely.

Technical Analysis

The vulnerability has been assigned a severity rating of Important with a CVSS v3.1 score of 7.1, indicating a high impact on Integrity (I: High) and Availability (A: High).

Exploitation requires local access but is marked by low attack complexity and does not require user interaction.

The exploit has been labeled “functional,” meaning attackers are actively leveraging this flaw in real-world scenarios.

Key Metrics:

  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None

Exploit Status and Impact

Microsoft confirmed that this vulnerability is being actively exploited in the wild, making it a pressing concern for individuals and organizations using affected versions of Windows.

While specific details of exploited cases remain undisclosed, it is evident that attackers are leveraging this vulnerability to delete or manipulate sensitive files, potentially leading to system downtime or data loss.

The exploitability of the vulnerability is heightened due to the improper resolution of symbolic links, which can be manipulated by attackers to gain unauthorized access.

The scope remains “unchanged,” signifying that the vulnerability does not impact additional components beyond the targeted system.

As of the time of publication, Microsoft has issued an official fix as part of their latest Patch Tuesday, February 2025 updates. All users and organizations are strongly encouraged to apply the latest security patches provided by Microsoft to mitigate the risk.

  1. Prompt Updates: Ensure all critical and security updates for Windows are applied immediately.
  2. Privilege Restriction: Limit user privileges to the minimum required for their roles.
  3. File System Monitoring: Enable visibility into file modifications or deletions.

The discovery of CVE-2025-21391 highlights the growing threat of 0-day vulnerabilities targeting critical operating system components.

With active exploitation already underway, swift action is essential to safeguard sensitive data and ensure system stability.

Microsoft and Mitre are continuing to monitor the situation and encourage users to stay informed and up-to-date on future developments.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field...

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored...

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with...

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field...

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored...

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with...