Microsoft Quietly Patches Long-Exploited Windows Shortcut Vulnerability

Microsoft patches long-exploited Windows Shortcut (LNK) vulnerability enabling hidden remote code execution

  • Microsoft quietly fixed a security vulnerability exploited since 2017 in November 2025 updates.
  • The issue, CVE-2025-9491, involves a Windows Shortcut (LNK) file flaw enabling remote code execution.
  • The vulnerability hides malicious commands in LNK files by truncating long strings in the properties view.
  • Several state-sponsored groups used this flaw for espionage and Malware delivery campaigns.
  • Microsoft now displays the full command in LNK file properties to prevent this exploit.

Microsoft addressed a long-exploited security vulnerability as part of its November 2025 Patch Tuesday updates. The flaw, identified as CVE-2025-9491, affected Windows Shortcut (LNK) files and has been exploited by threat actors since 2017.

- Advertisement -

This vulnerability allowed attackers to craft .LNK files that misled users by hiding malicious commands in the file’s properties interface. According to the NIST National Vulnerability Database (NVD), a carefully designed LNK file could execute code with the current user’s privileges while appearing benign due to concealed harmful content.

The flaw revolves around the LNK file’s Target field, which supports very long strings of up to 32,000 characters, but Windows’ properties dialog only displayed the first 260 characters. This limitation allowed malicious instructions beyond that length to remain invisible to users inspecting the file, often disguised as harmless documents.

Reports dating back to March 2025 revealed that 11 state-sponsored groups from China, Iran, North Korea, and Russia leveraged this vulnerability for data theft, espionage, and financial gain. Despite early warnings, Microsoft initially chose not to patch it immediately, citing existing user warnings on opening LNK files from unknown sources and user interaction requirements.

Following further abuse by a cyber espionage group named XDSpy and later campaigns delivering malware like PlugX targeting European diplomatic entities, the company issued official guidance on the vulnerability but maintained its position. However, the November 2025 update silently fixed the issue by changing the properties dialog to show the entire Target command line, regardless of length, thus preventing the attack vector.

- Advertisement -

A micropatch developed by ACROS Security’s 0patch offered an alternate solution by warning users when opening files exceeding 260 characters in the Target field. The patch and the official update aim to mitigate this longstanding risk by improving visibility of hidden commands in LNK files.

Microsoft’s security advisory and the technical details of the fix can be found on their security update guide. Further discussion on the vulnerability and its exploitation history was published by ACROS Security’s 0patch blog.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Waymo Targets 1M Weekly Paid Rides by 2026

Waymo, owned by Alphabet, aims to surpass one million paid rides per week by...

Microsoft: Firms Use AI Buttons to Poison Chatbot Memories

A disturbing new digital manipulation tactic has been uncovered by Microsoft security researchers, who...

Aave Lab Offers Revenue, New Focus to DAO’s End Feud

Aave Labs has proposed a new framework directing all revenue from Aave-branded products to...

Soldier used military secrets for $150K crypto bets.

An Israeli reserve soldier and a civilian accomplice face charges for allegedly using military...

BitGo, 21Shares Expand ETF Staking & Custody Partnership

BitGo and 21Shares have expanded their partnership to provide custody, trading, and staking services...

Must Read

10 BEST Companies to Buy Hosting With Bitcoin And Crypto

If you are looking to buy hosting with bitcoin or cryptocurrency then you've come to the right place.I've done the research for you...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!