8.8 CVE-2026-25177

Enriched by CISA
 

Improper restriction of names for files and other resources in Active Directory Domain Services allows an authorized attacker to elevate privileges over a network.
https://nvd.nist.gov/vuln/detail/CVE-2026-25177

Categories

CWE-641 : Improper Restriction of Names for Files and Other Resources
This may produce resultant weaknesses. For instance, if the names of these resources contain scripting characters, it is possible that a script may get executed in the client's browser if the application ever displays the name of the resource on a dynamically generated web page. Alternately, if the resources are consumed by some application parser, a specially crafted name can exploit some vulnerability internal to the parser, potentially resulting in execution of arbitrary code on the server machine. The problems will vary based on the context of usage of such malformed resource names and whether vulnerabilities are present in or assumptions are made by the targeted technology that would make code execution possible.

References


 

AFFECTED (from MITRE)


Vendor Product Versions
Microsoft Windows 10 Version 1607
  • 10.0.14393.0 < 10.0.14393.8957 [affected]
Microsoft Windows 10 Version 1809
  • 10.0.17763.0 < 10.0.17763.8511 [affected]
Microsoft Windows 10 Version 21H2
  • 10.0.19044.0 < 10.0.19044.7058 [affected]
Microsoft Windows 10 Version 22H2
  • 10.0.19045.0 < 10.0.19045.7058 [affected]
Microsoft Windows 11 version 22H3
  • 10.0.22631.0 < 10.0.22631.6783 [affected]
Microsoft Windows 11 Version 23H2
  • 10.0.22631.0 < 10.0.22631.6783 [affected]
Microsoft Windows 11 Version 24H2
  • 10.0.26100.0 < 10.0.26100.8037 [affected]
Microsoft Windows 11 Version 25H2
  • 10.0.26200.0 < 10.0.26200.8037 [affected]
Microsoft Windows 11 version 26H1
  • 10.0.28000.0 < 10.0.28000.1719 [affected]
Microsoft Windows Server 2012
  • 6.2.9200.0 < 6.2.9200.25973 [affected]
Microsoft Windows Server 2012 (Server Core installation)
  • 6.2.9200.0 < 6.2.9200.25973 [affected]
Microsoft Windows Server 2012 R2
  • 6.3.9600.0 < 6.3.9600.23074 [affected]
Microsoft Windows Server 2012 R2 (Server Core installation)
  • 6.3.9600.0 < 6.3.9600.23074 [affected]
Microsoft Windows Server 2016
  • 10.0.14393.0 < 10.0.14393.8957 [affected]
Microsoft Windows Server 2016 (Server Core installation)
  • 10.0.14393.0 < 10.0.14393.8957 [affected]
Microsoft Windows Server 2019
  • 10.0.17763.0 < 10.0.17763.8511 [affected]
Microsoft Windows Server 2019 (Server Core installation)
  • 10.0.17763.0 < 10.0.17763.8511 [affected]
Microsoft Windows Server 2022
  • 10.0.20348.0 < 10.0.20348.4893 [affected]
Microsoft Windows Server 2022, 23H2 Edition (Server Core installation)
  • 10.0.25398.0 < 10.0.25398.2207 [affected]
Microsoft Windows Server 2025
  • 10.0.26100.0 < 10.0.26100.32522 [affected]
Microsoft Windows Server 2025 (Server Core installation)
  • 10.0.26100.0 < 10.0.26100.32522 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* < 10.0.14393.8957
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* < 10.0.14393.8957
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* < 10.0.17763.8511
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* < 10.0.17763.8511
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:* < 10.0.19044.7058
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:* < 10.0.19044.7058
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:* < 10.0.19044.7058
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:* < 10.0.19045.7058
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:* < 10.0.19045.7058
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:* < 10.0.19045.7058
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:* < 10.0.22631.6783
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:* < 10.0.22631.6783
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:* < 10.0.26100.7979
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:* < 10.0.26100.7979
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:arm64:* < 10.0.26200.7979
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:x64:* < 10.0.26200.7979
cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:arm64:* < 10.0.28000.1719
cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:x64:* < 10.0.28000.1719
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* < 10.0.14393.8957
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* < 10.0.17763.8511
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* < 10.0.20348.4830
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:* < 10.0.25398.2207
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:* < 10.0.26100.32463


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry