AI description
CVE-2025-21391 is an elevation of privilege vulnerability in Windows Storage, a feature managing data storage on Windows systems. A local, authenticated attacker could exploit this to delete specific files, potentially disrupting services if essential files are removed. This vulnerability does not allow the disclosure of confidential information. This vulnerability has been observed being exploited in the wild. It affects various versions of Windows and Windows Server. Microsoft has addressed this vulnerability as part of their February 2025 Patch Tuesday updates.
- Description
- Windows Storage Elevation of Privilege Vulnerability
- Source
- secure@microsoft.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.1
- Impact score
- 5.2
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
- Severity
- HIGH
Data from CISA
- Vulnerability name
- Microsoft Windows Storage Link Following Vulnerability
- Exploit added on
- Feb 11, 2025
- Exploit action due
- Mar 4, 2025
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
- secure@microsoft.com
- CWE-59
- nvd@nist.gov
- NVD-CWE-noinfo
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
1
🚨 Critical Patch Release! Microsoft's February 2025 Patch Tuesday addresses 55 vulnerabilities, including 4 zero-days, 2 actively exploited in the wild. Immediate action is crucial! 🔑 Key Highlights: 4 Zero-Day Vulnerabilities: Including actively exploited CVE-2025-21391… htt
@TheSecMaster1
21 Feb 2025
679 Impressions
3 Retweets
5 Likes
3 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-21391
@transilienceai
19 Feb 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391) https://t.co/H5RQzcg85o https://t.co/Gy0VUQ4NoV
@NickBla41002745
19 Feb 2025
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-21391
@transilienceai
19 Feb 2025
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-21391
@transilienceai
18 Feb 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391) https://t.co/0cIkbN7TPr https://t.co/iC7iTT1GeS
@IT_Peurico
17 Feb 2025
25 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-21391
@transilienceai
17 Feb 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-21391
@transilienceai
16 Feb 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-21391
@transilienceai
15 Feb 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Security Updates: Microsoft released its Patch Tuesday updates, addressing 63 flaws, including two vulnerabilities (CVE-2025-21391, CVE-2025-21418) that were already under active exploitation. The U.S. CISA has mandated federal agencies to apply these patches by March 4, 2025.… h
@NgChinSiang2
14 Feb 2025
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391) https://t.co/p7N2YOFnYu https://t.co/AhIHuuFppH
@ggrubamn
14 Feb 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-21391
@transilienceai
14 Feb 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391) https://t.co/TsugpLlMGG https://t.co/AmQVS20RbT
@NickBla41002745
13 Feb 2025
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391) https://t.co/6j5gFxWn5G https://t.co/nAXrFsXoOh
@TechMash365
13 Feb 2025
59 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Microsoft has released patches for 63 flaws, including 2 actively exploited vulnerabilities. CVE-2025-21391 allows attackers to delete crucial files, while CVE-2025-21418 enables SYSTEM privilege escalation on Windows. https://t.co/pTwr7EXEgF
@achi_tech
12 Feb 2025
55 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s February 2025 Security Update fixes 57 flaws, including 4 zero-days (2 actively exploited)! 🔹 CVE-2025-21391 – Windows Storage privilege escalation 🔹 CVE-2025-21418 – WinSock flaw granting SYSTEM privileges Publicly disclosed: NTLM hash leak & PixieFail bypass
@dCypherIO
12 Feb 2025
85 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Patch Tuesday - February 2025: CVE-2025-21391 & CVE-2025-21418 are elevation of privilege vulnerabilities in Windows Storage & the AFD for WinSock. Exploitation has been observed in the wild. Patching is highly recommended. #Threa... https://t.co/4PgILHvTGm
@RedLegg
12 Feb 2025
20 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391) https://t.co/6sHS1PXY1i https://t.co/1D5w4PrS8p
@pcasano
12 Feb 2025
35 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Microsoft has released patches for 63 flaws, including 2 actively exploited vulnerabilities. CVE-2025-21391 allows attackers to delete crucial files, while CVE-2025-21418 enables SYSTEM privilege escalation on Windows https://t.co/GbiQxl43FK
@TechProgramm
12 Feb 2025
54 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
آپدیت دیروز ویندوز (فوریه) ۵۵ مشکل امنیتی رو رفع میکنه که ۲ تاشون همین الان توسط هکرها استفاده میشن. دو تا آسیبپذیری: CVE-2025-21418 که یه باگ افزایش سطح دسترسی توی Windows Ancillary Function Driver for WinSock هست و CVE-2025-21391 مورد مشابه توی Windows Storage. https://t.co/o0
@Geek_Alerts
12 Feb 2025
4774 Impressions
4 Retweets
53 Likes
6 Bookmarks
0 Replies
0 Quotes
🚨 Microsoft has released patches for 63 flaws, including 2 actively exploited vulnerabilities. CVE-2025-21391 allows attackers to delete crucial files, while CVE-2025-21418 enables SYSTEM privilege escalation on Windows. 🔧 Apply the latest update now. Read more:… https://t.co
@TheHackersNews
12 Feb 2025
41714 Impressions
57 Retweets
149 Likes
19 Bookmarks
4 Replies
1 Quote
🚨 CVE Alert: Microsoft Windows Storage Link Following Zero-day Vulnerability Exploited In The Wild🚨 Vulnerability Details: CVE-2025-21391 (CVSS 7.1/10) Microsoft Windows Storage Link Following Vulnerability Impact: A Successful exploit may allow an attacker to delete data… ht
@CyberxtronTech
12 Feb 2025
61 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391) https://t.co/QF2KkyNIyj https://t.co/sZab1RFMh6
@secured_cyber
11 Feb 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391) https://t.co/EUx1tlu5RP https://t.co/vYajV6LXNs
@Trej0Jass
11 Feb 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s February 2025 Patch Tuesday Addresses 55 CVEs (CVE-2025-21418, CVE-2025-21391) https://t.co/Ln39PfYuLA https://t.co/521vaz2zmA
@Trej0Jass
11 Feb 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Patch Tuesday: February 2025 🚨 Microsoft patches 56 vulnerabilities, including 2 zero-days (CVE-2025-21418, CVE-2025-21391). Here's a full breakdown: https://t.co/6EPl6dXvBz Other critical updates include: Windows: 56 vulnerabilities, two zero-days (CVE-2025-21418 and… h
@Action1corp
11 Feb 2025
62 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-21391 Windows Storage Elevation of Privilege Vulnerability https://t.co/QLWGd1BpQH
@CVEnew
11 Feb 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "8B692D57-D1F5-440E-AC28-C7633740ED6E",
"versionEndExcluding": "10.0.10240.20915"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "44723F8C-6B56-4A27-B213-E822ADC16078",
"versionEndExcluding": "10.0.10240.20915"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "C91C224C-5CC9-42EF-8053-AC80EE2CC2B5",
"versionEndExcluding": "10.0.14393.7785"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "07421D08-3F88-4532-B652-36825784EFF9",
"versionEndExcluding": "10.0.14393.7785"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "B5BC47F5-150E-4D18-8CC4-356F22171D81",
"versionEndExcluding": "10.0.17763.6893"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "E448ECB4-CE46-4A29-A092-5A4D334E5535",
"versionEndExcluding": "10.0.17763.6893"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A932CBA3-651F-4BBA-968A-2D6CA7DF8506",
"versionEndExcluding": "10.0.19044.5487"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "810C8ECB-619F-447C-B352-E66F7EF5216E",
"versionEndExcluding": "10.0.19045.5487"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "30AF7170-5722-4C9C-A8AD-7A9F0C5952EE",
"versionEndExcluding": "10.0.22621.4890"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "62FFD367-FB8B-48CA-813F-760E4F393555",
"versionEndExcluding": "10.0.22631.4890"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B9C5B9BC-F08B-49F8-82D3-7CC6BDB68995",
"versionEndExcluding": "10.0.26100.3194"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "208FA80F-F742-473E-81D5-003DC2BFFC6C",
"versionEndExcluding": "10.0.14393.7785"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "273EE4B9-8B53-4387-98C8-EC5D2558DB82",
"versionEndExcluding": "10.0.17763.6893"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1711CDE0-4C93-40D3-91B7-DE507143A45F",
"versionEndExcluding": "10.0.20348.3207"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D3106289-A3E3-4508-B118-17BD2488D681",
"versionEndExcluding": "10.0.25398.1425"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "70BC66D1-8679-4FA5-A4E0-2E9FDB56E273",
"versionEndExcluding": "10.0.26100.3194"
}
],
"operator": "OR"
}
]
}
]