赛派号

美的烟机灶具由什么组成的 Microsoft quietly patches LNK vulnerability that's been weaponized for years

Microsoft’s November 2025 Patch Tuesday fixed 63 flaws, including CVE-2025-9491 in Windows LNK filesThe bug let attackers hide malicious commands in shortcut files, enabling RCE attacksExploited since 2017 by state-sponsored groups from China, Iran, North Korea, and Russia; severity rated 7.8/10

The November 2025 Patch Tuesday cumulative update fixed a vulnerability that hackers he been exploiting for years.

On November 12, Microsoft released a patch that addressed 63 vulnerabilities. Among them was a “Microsoft Windows LNK file UI misrepresentation” vulnerability that enabled Remote Code Execution (RCE) attacks via weaponized shortcut (.LNK) files.

According to the National Vulnerability Database (NVD), “crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user.”

You may like Windows 10 event header CISA warns high-severity Windows SMB flaw now exploited in attacks, so update now Flag of the People's Republic of China overlaid with a technological network of wires and circuits. Chinese hackers target European diplomats with Windows zero-day flaw Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration. Windows Server flaw targeted by hackers to spread malware - here's what we know Catch the price drop- Get 30% OFF for Enterprise and Business plans

Catch the price drop- Get 30% OFF for Enterprise and Business plans

The Black Friday campaign offers 30% off for Enterprise and Business plans for a 1- or 2-year subscription. It’s valid until December 10th, 2025. Customers must enter the promo code BLACKB2B-30 at checkout to redeem the offer.

View DealAbused for years

In other words, the bug lets attackers hide what the shortcut really does. When a victim right-clicks the shortcut file to check its properties, Windows hides the file’s full path and commands it will run, making the file appear safe even when it isn’t.

The bug is now tracked as CVE-2025-9491 and has a severity score of 7.8/10 (high).

Cybercriminals turned to .LNK files years ago, when Microsoft first banned the use of macros in downloaded Office files. In more recent times, Trend Micro’s Zero Day Initiative (ZDI) reported that the bug was being weaponized by 11 state-sponsored groups from China, Iran, North Korea, and Russia, who were using it for cyber-espionage, data theft, and fraud, apparently since 2017.

At first, Microsoft did not want to fix it, telling The Hacker News it wasn’t that big of a deal. It also said that the .LNK format is blocked in Outlook, Word, Excel, PowerPoint, and OneNote and whoever tried running these files would get a warning not to open documents from unknown sources.

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

However, since multiple cybersecurity companies warned about the abuse, and pointed out that state-sponsored attackers were using the bug too, Microsoft decided to fix it.

Via The Hacker News

Best antivirus software headerThe best antivirus for all budgetsOur top picks, based on real-world testing and comparisons

➡️ Read our full guide to the best antivirus1. Best overall:Bitdefender Total Security2. Best for families:Norton 360 with LifeLock3. Best for mobile:McAfee Mobile Security

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

版权声明:本文内容由互联网用户自发贡献,该文观点仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容, 请发送邮件至lsinopec@gmail.com举报,一经查实,本站将立刻删除。

上一篇 没有了

下一篇没有了