{"uuid": "dd20592c-8c1f-4b9d-9c8f-d93f17024586", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21391", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3912", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21391\n\ud83d\udc80 Vulnerability: Microsoft Windows Storage Link Following Vulnerability\n\ud83c\udfe2 Vendor: Microsoft\n\ud83d\udda5\ufe0f Product: Windows\n\ud83d\udd25 Known Ransomware Use: Unknown\n\ud83d\udea8 Exploitation Links: 0 reported\n\ud83d\udcca CVSS Score: N/A\n\ud83d\udd39 Description: Microsoft Windows Storage contains a link following vulnerability that could allow for privilege escalation. This vulnerability could allow an attacker to delete data including data that results in the service being unavailable.\n\ud83d\udd27 Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\ud83d\udccf Published: 2025-02-11T00:00:00Z\n\ud83d\udcc5 Due Date: 2025-03-04T00:00:00Z\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-02-11T20:26:40.000000Z"}