|
Navigation
Recherche
|
Microsoft 'Mitigates' Windows LNK Flaw Exploited As Zero-Day
jeudi 4 décembre 2025, 20:19 , par Slashdot
As Trend Micro threat analysts discovered in March 2025, the CVE-2025-9491 was already being widely exploited by 11 state-sponsored groups and cybercrime gangs, including Evil Corp, Bitter, APT37, APT43 (also known as Kimsuky), Mustang Panda, SideWinder, RedHotel, Konni, and others. Microsoft told BleepingComputer in March that it would 'consider addressing' this zero-day flaw, even though it didn't 'meet the bar for immediate servicing.' ACROS Security CEO and 0patch co-founder Mitja Kolsek found, Microsoft has silently changed LNK files in the November updates in an apparent effort to mitigate the CVE-2025-9491 flaw. After installing last month's updates, users can now see all characters in the Target field when opening the Properties of LNK files, not just the first 260. As the movie the Ninth Gate stated: 'silentium est aurum' Read more of this story at Slashdot.
https://it.slashdot.org/story/25/12/04/1744255/microsoft-mitigates-windows-lnk-flaw-exploited-as-zer...
Voir aussi |
56 sources (32 en français)
Date Actuelle
jeu. 4 déc. - 21:53 CET
|








