A newly discovered 0-day vulnerability in Windows Storage has sent shockwaves through the cybersecurity community.
Identified as CVE-2025-21391, this critical flaw allows attackers to elevate privilege and remotely delete targeted files on a victim’s system without their interaction. Microsoft officially confirmed the issue on February 11, 2025.
According to the advisory, this vulnerability stems from a weakness categorized under CWE-59: Improper Link Resolution Before File Access (‘Link Following’).
If exploited successfully, threat actors with low-level privileges may elevate their access and compromise the integrity and availability of the system, deleting critical files remotely.
The vulnerability has been assigned a severity rating of Important with a CVSS v3.1 score of 7.1, indicating a high impact on Integrity (I: High) and Availability (A: High).
Exploitation requires local access but is marked by low attack complexity and does not require user interaction.
The exploit has been labeled “functional,” meaning attackers are actively leveraging this flaw in real-world scenarios.
Key Metrics:
Microsoft confirmed that this vulnerability is being actively exploited in the wild, making it a pressing concern for individuals and organizations using affected versions of Windows.
While specific details of exploited cases remain undisclosed, it is evident that attackers are leveraging this vulnerability to delete or manipulate sensitive files, potentially leading to system downtime or data loss.
The exploitability of the vulnerability is heightened due to the improper resolution of symbolic links, which can be manipulated by attackers to gain unauthorized access.
The scope remains “unchanged,” signifying that the vulnerability does not impact additional components beyond the targeted system.
As of the time of publication, Microsoft has issued an official fix as part of their latest Patch Tuesday, February 2025 updates. All users and organizations are strongly encouraged to apply the latest security patches provided by Microsoft to mitigate the risk.
The discovery of CVE-2025-21391 highlights the growing threat of 0-day vulnerabilities targeting critical operating system components.
With active exploitation already underway, swift action is essential to safeguard sensitive data and ensure system stability.
Microsoft and Mitre are continuing to monitor the situation and encourage users to stay informed and up-to-date on future developments.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Microsoft Threat Intelligence has exposed a novel cyberattack method employed by the North Korean state-sponsored…
Microsoft has confirmed the discovery of a significant zero-day vulnerability, tracked as CVE-2025-21418, in the Windows…
A critical vulnerability in Fortinet's FortiOS and FortiProxy products has been identified, enabling attackers to…
Fortinet’s FortiOS, the operating system powering its VPN and firewall appliances, has been found vulnerable…
A newly discovered malware, dubbed "Ratatouille" (or I2PRAT), is raising alarms in the cybersecurity community…
In a sophisticated cyber-espionage operation, the Russian state-sponsored hacking group Sandworm (APT44), linked to the…