AI description
CVE-2025-49760 is a spoofing vulnerability in Windows Storage that stems from external control of a file name or path. An authorized attacker could exploit this vulnerability over a network. The vulnerability exists in the Windows Remote Procedure Call (RPC) protocol. By manipulating a core component of the RPC protocol, an attacker can conduct an Endpoint Mapper (EPM) poisoning attack. This allows an unprivileged user to pose as a legitimate service and coerce a protected process to authenticate against an arbitrary server. Microsoft addressed this vulnerability in their July 2025 Patch Tuesday update.
- Description
- External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network.
- Source
- secure@microsoft.com
- NVD status
- Analyzed
- Products
- windows_10_1507, windows_10_1607, windows_10_1809, windows_10_21h2, windows_10_22h2, windows_11_22h2, windows_11_23h2, windows_11_24h2, windows_server_2016, windows_server_2019, windows_server_2022, windows_server_2022_23h2, windows_server_2025
CVSS 3.1
- Type
- Primary
- Base score
- 3.5
- Impact score
- 1.4
- Exploitability score
- 2.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
- Severity
- LOW
- secure@microsoft.com
- CWE-73
- Hype score
- Not currently trending
#VulnerabilityReport #activedirectory EPM Poisoning (CVE-2025-49760): New Windows RPC Exploit Hijacks Services, Allowing Full Active Directory Compromise, PoC Releases https://t.co/WX6Hp6liMP
@Komodosec
18 Sept 2025
60 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Hacking attempts on your device? DM now for risk free security solutions. #hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking #discord #XboxSeriesX #XboxShare #roblox 🔥 Windows had a hole [CVE-2025-49760] in its core RPC system
@5g_rescue
16 Sept 2025
34 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Hacking attempts on your device? DM now for risk free security solutions. #hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking #discord #XboxSeriesX #XboxShare #roblox 🔥 Windows had a hole [CVE-2025-49760] in its core RPC system
@Shadows_hacker
9 Sept 2025
90 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
If your account is Hacked, or your Account is being tempered with, All you need is a Good hacker... Inbox now for all Hacking Services #Hacked #icloud #snapchat #Discord #Roblox #missingphone #privacy 🔥 Windows had a hole [CVE-2025-49760] in its core RPC system that let attack
@PRIVATEHUNTERS1
17 Aug 2025
86 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
If your account is Hacked, or your Account is being tempered with, All you need is a Good hacker... Inbox now for all Hacking Services #Hacked #icloud #snapchat #Discord #Roblox #missingphone #privacy 🔥 Windows had a hole [CVE-2025-49760] in its core RPC system that let https:
@Shadows_hacker
17 Aug 2025
130 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
به تازگی برای پروتکل RPC یا همان Remote Procedure Call در ویندوز ، آسیب پذیری با کد شناسایی CVE-2025-49760 منتشر شده است. این آسیب پذیری باعث ارتقای سطح دسترسی و سرقت اطلاعا
@AmirHossein_sec
14 Aug 2025
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Alert🚨 CVE-2025-49760 : New Windows RPC Exploit Hijacks Services, Allowing Full Active Directory Compromise 🧐Deep Dive :https://t.co/tSVWNKlbm1 📊231.6M Services are found on the https://t.co/ysWb28BTvF yearly. 🔗Hunter Link:https://t.co/CyIRQG22AY 👇Query HUNTER
@HunterMapping
12 Aug 2025
8130 Impressions
50 Retweets
151 Likes
73 Bookmarks
3 Replies
0 Quotes
Des chercheurs en cybersécurité dévoilent une chaîne d’exploitation d’une faille corrigée dans le protocole RPC de #Windows, permettant l’usurpation d’un serveur et l’élévation de privilèges. CVE-2025-49760, note 3.5 🛡️🔐 #CyberSecurity #IA #InnovationIA
@meg_ai_fr
11 Aug 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
WindowsのRPCプロトコルがサーバのなりすまし攻撃に使用可能。SafeBreach社報告。CVE-2025-49760はエンドポイントマッパーにおける競合状態に勝つとリクエストの解決先を攻撃者のサーバに書き換えられる。デモ用ツ
@__kokumoto
11 Aug 2025
1629 Impressions
6 Retweets
16 Likes
6 Bookmarks
1 Reply
0 Quotes
🔍 New Windows EPM Poisoning flaw could allow domain privilege escalation, CVE-2025-49760 patched in July 2025, read more: https://t.co/AR3YT97J6O https://t.co/gNJsW2LJxI
@sctocs25
10 Aug 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-49760は、Microsoft WindowsのRPC(Remote Procedure Call)通信におけるEPM(Endpoint Mapper)を悪用したスプーフィング脆弱性である。 Windows
@yousukezan
10 Aug 2025
1444 Impressions
1 Retweet
4 Likes
1 Bookmark
0 Replies
0 Quotes
📌 بحث الباحثون عن ثغرة في بروتوكول "Windows RPC" تسمح لهجمات انتحال الهوية ورفع الامتيازات للمهاجمين. الثغرة، المعروفة باسم CVE-2025-49760، حصلت على تقييم 3.5، وقد تم
@Cybercachear
10 Aug 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Windows RPC protocol vulnerability allows spoofing. Microsoft addresses under CVE-2025-49760. Stay updated. https://t.co/VRdGGZG62W
@threatlight
10 Aug 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔥 Windows had a hole [CVE-2025-49760] in its core RPC system that let attackers pretend to be trusted services—like hijacking DNS, but inside your OS. The wild part? Even Windows Defender’s ID could be spoofed. Here’s how the EPM poisoning attack w... https://t.co/AIJn
@IT_news_for_all
10 Aug 2025
52 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔥 Windows had a hole [CVE-2025-49760] in its core RPC system that let attackers pretend to be trusted services—like hijacking DNS, but inside your OS. The wild part? Even Windows Defender’s ID could be spoofed. Here’s how the EPM poisoning attack worked ↓ https://t.c
@TheHackersNews
10 Aug 2025
29299 Impressions
83 Retweets
249 Likes
103 Bookmarks
2 Replies
2 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "9D58CEDA-0611-4E21-87AF-C368F45BB685",
"versionEndExcluding": "10.0.10240.21073"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "1EEA1F09-0FA7-4946-8005-F0CF177B1103",
"versionEndExcluding": "10.0.10240.21073"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "3CEAC32A-5246-4F6B-8DD5-E49F3BA621DA",
"versionEndExcluding": "10.0.14393.8246"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "E0A0243D-52B4-49AE-B1AE-263640C492B0",
"versionEndExcluding": "10.0.14393.8246"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "2062C268-282B-4E52-9F8C-876A2D483EAD",
"versionEndExcluding": "10.0.17763.7558"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "00FCA704-C6E0-4DE4-86F0-80552527AE53",
"versionEndExcluding": "10.0.17763.7558"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "50848190-CF61-47F6-90B8-DB0C120749F5",
"versionEndExcluding": "10.0.19044.6093"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "01E62E99-5EDA-487C-A941-E2DA348B501F",
"versionEndExcluding": "10.0.19045.6093"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "76FEE1E8-EB22-4E01-86D7-13B35F9D2876",
"versionEndExcluding": "10.0.22621.5624"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "19D0DAB7-4BFF-4BB7-9E0E-B020CF8573C9",
"versionEndExcluding": "10.0.22631.5624"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8E866DB2-9CA7-4BCC-8591-9BC94300B779",
"versionEndExcluding": "10.0.26100.4652"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F6FA4941-0641-4EA0-99A8-97121F625380",
"versionEndExcluding": "10.0.14393.8246"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DCFD9FA0-D149-422A-975C-582C9BC9024D",
"versionEndExcluding": "10.0.17763.7558"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AE46D39E-7048-4A31-9753-39F6E5F97D1D",
"versionEndExcluding": "10.0.20348.3932"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "613302B8-D5C2-4908-9FC9-0EC1650D4517",
"versionEndExcluding": "10.0.25398.1732"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "10E640FB-32AB-45B6-BC42-56CC587C0A35",
"versionEndExcluding": "10.0.26100.4652"
}
],
"operator": "OR"
}
]
}
]