This vulnerability occurs when an application's security controls successfully block access to a file's full name on Windows, but fail to protect the shorter 8.3 format version of the same filename, creating a bypassable loophole.
Windows maintains backward compatibility by automatically generating a short 8.3 filename (like 'DOCUME~1.TXT') for files with longer names. This creates two distinct paths to the same file. If your access control checks only validate the long filename, attackers can simply use the equivalent short name to bypass your restrictions. This is a classic path equivalence flaw where the system sees 'LONGFILENAME.DOC' and 'LONGFI~1.DOC' as different strings, even though they point to the same underlying resource. Developers must normalize and validate both naming formats in their security logic to close this gap.
Impact: Read Files or DirectoriesModify Files or Directories