The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-21373

CVE-2025-21373: Windows 10 1507 Privilege Escalation Flaw

CVE-2025-21373 is a privilege escalation vulnerability in Windows Installer affecting Windows 10 1507. Attackers can exploit this flaw to gain elevated system privileges. This article covers technical details, impact, and mitigation.

Updated: January 22, 2026

CVE-2025-21373 Overview

CVE-2025-21373 is an Elevation of Privilege vulnerability affecting the Windows Installer service across a wide range of Microsoft Windows operating systems. This vulnerability allows a local attacker with low privileges to escalate their access to gain full control over an affected system. The flaw stems from improper link resolution before file access, classified under CWE-59 (Improper Link Resolution Before File Access), commonly known as a symlink attack vulnerability.

Critical Impact

A local attacker could exploit this vulnerability to elevate privileges from a standard user account to SYSTEM-level access, enabling complete compromise of the affected Windows system including the ability to install programs, modify data, and create new accounts with full user rights.

Affected Products

  • Microsoft Windows 10 (versions 1507, 1607, 1809, 21H2, 22H2)
  • Microsoft Windows 11 (versions 22H2, 23H2, 24H2)
  • Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022, 2022 23H2, 2025

Discovery Timeline

  • February 11, 2025 - CVE-2025-21373 published to NVD
  • February 26, 2025 - Last updated in NVD database

Technical Details for CVE-2025-21373

Vulnerability Analysis

This vulnerability exists within the Windows Installer service (msiexec.exe), a core Windows component responsible for the installation, maintenance, and removal of software. The flaw is categorized as an improper link resolution vulnerability (CWE-59), which occurs when the Windows Installer service follows symbolic links (symlinks) or junction points without properly validating their targets.

When the Windows Installer service performs privileged operations on files or directories, it may follow symbolic links created by a low-privileged attacker. This behavior can be exploited to redirect file operations to arbitrary locations, potentially overwriting critical system files or manipulating security-sensitive configurations with SYSTEM-level privileges.

The vulnerability requires local access and low-privilege user authentication, meaning an attacker must first gain access to the target system through another means before exploitation. However, no user interaction is required once the attacker has local access, making this vulnerability particularly dangerous in multi-user environments or scenarios where attackers have limited initial access.

Root Cause

The root cause of CVE-2025-21373 lies in the Windows Installer service's failure to properly validate symbolic links and junction points before performing file operations. When the installer service runs with elevated SYSTEM privileges, it processes file paths without adequately checking whether those paths contain symbolic links pointing to sensitive system locations.

This type of vulnerability, known as a symlink attack or link following vulnerability, occurs because:

  1. The Windows Installer service operates with SYSTEM-level privileges
  2. The service performs file operations on paths that can be influenced by low-privileged users
  3. Insufficient validation of symbolic links allows redirection of these file operations
  4. The time-of-check to time-of-use (TOCTOU) window enables exploitation

Attack Vector

The attack requires local access to the target system with a standard user account. An attacker would exploit this vulnerability through the following general approach:

  1. Identify a location where the Windows Installer service performs file operations
  2. Create a symbolic link or junction point at that location pointing to a sensitive target (such as system files or privileged directories)
  3. Trigger the Windows Installer service to perform operations that follow the symbolic link
  4. The installer service, running with SYSTEM privileges, performs the redirected operation on the attacker-specified target

This exploitation technique leverages the Windows Installer's elevated privileges to perform unauthorized actions on protected system resources. The vulnerability is particularly concerning because the Windows Installer service is a trusted system component that frequently handles privileged operations.

Detection Methods for CVE-2025-21373

Indicators of Compromise

  • Unusual symbolic link or junction point creation in Windows Installer working directories (e.g., %TEMP%, %WINDIR%\Installer)
  • Unexpected modifications to system files or directories by the msiexec.exe process
  • Suspicious Windows Installer activity from non-administrative user accounts
  • Creation of hardlinks or symlinks by non-privileged processes targeting system directories

Detection Strategies

  • Monitor for suspicious symbolic link creation events using Windows Event Logging and Sysmon (Event IDs for file system changes)
  • Deploy endpoint detection rules to identify msiexec.exe accessing unexpected file paths or following symbolic links to sensitive locations
  • Implement file integrity monitoring on critical system directories to detect unauthorized modifications
  • Use SentinelOne's behavioral AI to detect anomalous privilege escalation patterns associated with Windows Installer exploitation

Monitoring Recommendations

  • Enable advanced auditing for file system operations, particularly symbolic link creation and Windows Installer activity
  • Configure SIEM rules to alert on unusual patterns of Windows Installer service invocation by standard users
  • Monitor for process creation events where msiexec.exe spawns child processes with elevated privileges
  • Implement endpoint telemetry collection focusing on junction point and symlink operations in user-writable directories

How to Mitigate CVE-2025-21373

Immediate Actions Required

  • Apply the February 2025 Microsoft security updates immediately to all affected Windows systems
  • Prioritize patching domain controllers, critical servers, and multi-user systems where privilege escalation risks are highest
  • Review and restrict user permissions on systems where patching cannot be immediately applied
  • Enable enhanced Windows Defender protections and ensure endpoint security solutions are up to date

Patch Information

Microsoft has released security updates addressing this vulnerability as part of the February 2025 Patch Tuesday release. The official security advisory is available at the Microsoft Security Update Guide. Organizations should apply the appropriate update for their Windows version through Windows Update, WSUS, or Microsoft Update Catalog.

Patches are available for:

  • Windows 10 versions 1507, 1607, 1809, 21H2, and 22H2
  • Windows 11 versions 22H2, 23H2, and 24H2
  • Windows Server 2008 SP2, 2008 R2 SP1, 2012, 2012 R2, 2016, 2019, 2022, 2022 23H2, and 2025

Workarounds

  • Implement application whitelisting to control which applications can invoke the Windows Installer service
  • Use Windows Defender Application Control (WDAC) or AppLocker policies to restrict MSI package execution
  • Limit local access to systems and enforce least-privilege principles for user accounts
  • Consider temporarily restricting symbolic link creation capabilities for standard users in high-security environments
bash
# Verify patch installation status
wmic qfe list brief | findstr "KB"

# Check Windows Installer service status
sc query msiserver

# Review symbolic link privileges (PowerShell)
whoami /priv | Select-String "SeCreateSymbolicLinkPrivilege"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechWindows

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.32%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-59

  • NVD-CWE-noinfo
  • Vendor Resources
  • Microsoft Security Update CVE-2025-21373
  • Related CVEs
  • CVE-2026-23672: Windows UDFS Privilege Escalation Flaw

  • CVE-2026-25178: Windows WinSock Driver Privilege Escalation

  • CVE-2026-24283: Windows File Server Privilege Escalation

  • CVE-2026-24294: Windows SMB Server Privilege Escalation
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English