External Control of File Path in Windows NTLM by Microsoft
CVE-2026-20925

6.5MEDIUM

What is CVE-2026-20925?

A vulnerability exists in Windows NTLM that enables an unauthorized attacker to manipulate file paths, facilitating potential network spoofing. This flaw can be exploited to undermine the authenticity of NTLM authentication, allowing attackers to impersonate legitimate users and execute unauthorized actions over the network. Organizations should take immediate steps to mitigate risks associated with this vulnerability by applying patches and implementing security best practices.

Affected Version(s)

Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.8783

Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.8276

Windows 10 Version 21H2 32-bit Systems 10.0.19044.0 < 10.0.19044.6809

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.