Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-24288 | External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally. |
Fri, 15 Aug 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:windows_security_app:*:*:*:*:*:*:*:* |
Thu, 14 Aug 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Security App |
|
| Vendors & Products |
Microsoft
Microsoft windows Security App |
Tue, 12 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 Aug 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally. | |
| Title | Windows Security App Spoofing Vulnerability | |
| Weaknesses | CWE-73 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-02-13T18:54:52.656Z
Reserved: 2025-07-09T13:25:25.500Z
Link: CVE-2025-53769
Updated: 2025-08-12T19:59:44.224Z
Status : Analyzed
Published: 2025-08-12T18:15:45.627
Modified: 2025-08-15T16:58:17.243
Link: CVE-2025-53769
No data.
OpenCVE Enrichment
Updated: 2025-08-13T21:47:34Z
EUVD