Microsoft Patch Tuesday di ottobre 2025: 6 zero-day corretti, fine supporto Windows 10 e Exchange Server

di Redazione
0 commenti

Microsoft conclude un ciclo storico con il Patch Tuesday di ottobre 2025, che corregge 172 vulnerabilità e sei zero-day attivamente sfruttati, mentre segna la fine del supporto gratuito per Windows 10 e Exchange Server 2016 e 2019. L’azienda introduce miglioramenti nelle build di Windows 11 e fornisce l’ultimo aggiornamento cumulativo per Windows 10, preparando la transizione definitiva al nuovo ecosistema.

Patch Tuesday ottobre 2025: 172 vulnerabilità e sei zero-day

Nel suo ultimo bollettino mensile, Microsoft corregge otto vulnerabilità critiche, tra cui cinque di esecuzione di codice remoto (RCE) e tre di elevazione privilegi. Le restanti coprono 80 casi di privilege escalation, 11 bypass di sicurezza, 28 information disclosure, 11 denial of service e 10 spoofing.

Tra i casi più significativi figurano:

  • CVE-2025-0033, legata al componente AMD RMP, sfruttata per accesso a memoria protetta;
  • CVE-2025-59218 e CVE-2025-59246 in Azure Entra ID, vulnerabilità di identity management;
  • CVE-2025-59252 e CVE-2025-59286 in Copilot, che risolvono bug di input e autenticazione AI;
  • CVE-2025-59227 e CVE-2025-59234 in Microsoft Office, relative a macro e parsing dei file Excel;
  • CVE-2025-49708 nel Graphics Component, che poteva consentire l’esecuzione di codice da immagini manipolate;
  • CVE-2025-59271 in Redis Enterprise e CVE-2025-59287 in Windows Server, entrambe classificate come critiche.

Tre dei sei zero-day corretti risultano attivamente sfruttati in attacchi mirati, tra cui una falla in Agere Modem (CVE-2025-24990) e una in Secure Boot IGEL (CVE-2025-47827). Altre tre vulnerabilità erano già pubblicamente divulgate. Microsoft ribadisce l’importanza di applicare tempestivamente gli aggiornamenti, poiché le falle coinvolgono componenti chiave del kernel e della gestione autenticazioni.

Aggiornamenti per Windows 11: build 26200.6899 e 226×1.6050

Le versioni Windows 11 25H2 e 24H2 ricevono l’aggiornamento cumulativo KB5066835, che porta la build a 26200.6899, mentre Windows 11 23H2 viene aggiornato con KB5066793 (build 226×1.6050).

Tra i miglioramenti introdotti:

  • correzione di bug in print preview del browser e timeout di PowerShell Remoting;
  • fix per Windows Hello con fotocamere USB e input touch dopo la sospensione;
  • ottimizzazioni per desktop icon mirroring nelle lingue RTL come l’arabo;
  • miglioramenti nella gestione gamepad e fluidità del sistema;
  • introduzione del nuovo menu Click to Do e collegamenti diretti agli Agents AI in Impostazioni;
  • migliorata l’integrazione con Windows Share e File Explorer AI actions;
  • aggiunto Braille Viewer per Narrator e nuove scorciatoie per la scrittura automatica dei segni di punteggiatura.

Microsoft ha inoltre rimosso il driver modem ltmdm64.sys, ormai obsoleto, e integrato un Servicing Stack Update (SSU) per garantire la stabilità dei futuri aggiornamenti.

Ultimo aggiornamento per Windows 10: KB5066791

Il bollettino segna la chiusura del ciclo per Windows 10, che riceve il suo ultimo Patch Tuesday ufficiale. L’aggiornamento KB5066791 porta le versioni 22H2 e 21H2 rispettivamente alle build 19045.6456 e 19044.6456. Il pacchetto corregge bug in IME cinese, USER32 Edit Controls, SMBv1 e Autopilot ESP OOBE, oltre a migliorare la compatibilità con Azure Active Directory. Microsoft elimina anche qui il driver ltmdm64.sys e integra una Servicing Stack Update per garantire la stabilità dell’ultimo rilascio.

Con il termine del supporto il 14 ottobre 2025, Microsoft interrompe ogni aggiornamento gratuito e supporto tecnico per Windows 10, raccomandando il passaggio a Windows 11 o all’uso del programma Extended Security Updates (ESU).Gli utenti dell’Area Economica Europea (EEA) riceveranno ESU gratuiti, mentre altrove il piano prevede costi annuali di 27 euro per utenti domestici e 56 euro per azienda per dispositivo, con un raddoppio progressivo del prezzo fino al 2028.

Fine del supporto per Exchange Server 2016 e 2019

In concomitanza con il Patch Tuesday, Microsoft annuncia la fine del supporto per Exchange Server 2016 e 2019. Il 14 ottobre 2025 rappresenta l’ultimo giorno di patch, aggiornamenti di sicurezza e assistenza ufficiale. Le aziende che utilizzano ancora queste versioni devono migrare verso Exchange Server Subscription Edition (SE) o Exchange Online. Microsoft offre una procedura di migrazione in-place da Exchange 2019 a SE, mentre per gli utenti di Exchange 2016 è necessario un passaggio intermedio alla versione 2019 prima della transizione definitiva. La decisione risponde all’obiettivo di centralizzare la gestione email nel cloud e ridurre i rischi di vulnerabilità post-end-of-life, spesso sfruttate in campagne ransomware e di phishing aziendale.

Implicazioni per la sicurezza e la transizione cloud

Il Patch Tuesday di ottobre 2025 segna un punto di svolta nel percorso di Microsoft verso un ecosistema più sicuro, automatizzato e basato sull’intelligenza artificiale. Con la chiusura del ciclo di vita di Windows 10 e di Exchange Server, l’azienda punta su un’infrastruttura cloud-native e resiliente, dove la gestione predittiva delle minacce diventa la nuova norma. Le correzioni rilasciate per sei zero-day e oltre 170 vulnerabilità dimostrano la complessità crescente delle superfici d’attacco, mentre la migrazione verso Windows 11 e Microsoft 365 rafforza la strategia di sicurezza unificata. Gli utenti e le aziende sono invitati a verificare l’installazione delle patch e pianificare la transizione ai nuovi sistemi supportati, evitando esposizioni dovute a software obsoleto.

TagCVE IDCVE TitleSeverity
.NETCVE-2025-55247.NET Elevation of Privilege VulnerabilityImportant
.NET, .NET Framework, Visual StudioCVE-2025-55248.NET, .NET Framework, and Visual Studio Information Disclosure VulnerabilityImportant
Active Directory Federation ServicesCVE-2025-59258Windows Active Directory Federation Services (ADFS) Information Disclosure VulnerabilityImportant
Agere Windows Modem DriverCVE-2025-24990Windows Agere Modem Driver Elevation of Privilege VulnerabilityImportant
Agere Windows Modem DriverCVE-2025-24052Windows Agere Modem Driver Elevation of Privilege VulnerabilityImportant
AMD Restricted Memory PageCVE-2025-0033AMD CVE-2025-0033: RMP Corruption During SNP InitializationCritical
ASP.NET CoreCVE-2025-55315ASP.NET Security Feature Bypass VulnerabilityImportant
Azure Connected Machine AgentCVE-2025-47989Azure Connected Machine Agent Elevation of Privilege VulnerabilityImportant
Azure Connected Machine AgentCVE-2025-58724Arc Enabled Servers – Azure Connected Machine Agent Elevation of Privilege VulnerabilityImportant
Azure Entra IDCVE-2025-59218Azure Entra ID Elevation of Privilege VulnerabilityCritical
Azure Entra IDCVE-2025-59246Azure Entra ID Elevation of Privilege VulnerabilityCritical
Azure LocalCVE-2025-55697Azure Local Elevation of Privilege VulnerabilityImportant
Azure MonitorCVE-2025-55321Azure Monitor Log Analytics Spoofing VulnerabilityCritical
Azure Monitor AgentCVE-2025-59285Azure Monitor Agent Elevation of Privilege VulnerabilityImportant
Azure Monitor AgentCVE-2025-59494Azure Monitor Agent Elevation of Privilege VulnerabilityImportant
Azure PlayFabCVE-2025-59247Azure PlayFab Elevation of Privilege VulnerabilityCritical
Confidential Azure Container InstancesCVE-2025-59292Azure Compute Gallery Elevation of Privilege VulnerabilityCritical
Confidential Azure Container InstancesCVE-2025-59291Confidential Azure Container Instances Elevation of Privilege VulnerabilityCritical
Connected Devices Platform Service (Cdpsvc)CVE-2025-59191Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
Connected Devices Platform Service (Cdpsvc)CVE-2025-55326Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution VulnerabilityImportant
Connected Devices Platform Service (Cdpsvc)CVE-2025-58719Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
CopilotCVE-2025-59272Copilot Spoofing VulnerabilityCritical
CopilotCVE-2025-59252M365 Copilot Spoofing VulnerabilityCritical
CopilotCVE-2025-59286Copilot Spoofing VulnerabilityCritical
Data Sharing Service ClientCVE-2025-59200Data Sharing Service Spoofing VulnerabilityImportant
GamesCVE-2025-59489MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerabilityImportant
GitHubCVE-2025-59288Playwright Spoofing VulnerabilityModerate
Inbox COM ObjectsCVE-2025-58735Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58732Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-59282Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58733Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58734Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58738Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58731Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58730Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Inbox COM ObjectsCVE-2025-58736Inbox COM Objects (Global Memory) Remote Code Execution VulnerabilityImportant
Internet ExplorerCVE-2025-59295Windows URL Parsing Remote Code Execution VulnerabilityImportant
JDBC Driver for SQL ServerCVE-2025-59250JDBC Driver for SQL Server Spoofing VulnerabilityImportant
MarinerCVE-2025-39943ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transferCritical
MarinerCVE-2025-39946tls: make sure to abort the stream if headers are bogusModerate
MarinerCVE-2025-39942ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_sizeModerate
MarinerCVE-2025-39951um: virtio_uml: Fix use-after-free after put_device in probeModerate
MarinerCVE-2025-39932smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work)Moderate
MarinerCVE-2025-39949qed: Don’t collect too many protection override GRC elementsModerate
MarinerCVE-2025-39937net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointerModerate
MarinerCVE-2025-39955tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().Moderate
MarinerCVE-2025-39895sched: Fix sched_numa_find_nth_cpu() if mask offlineModerate
MarinerCVE-2025-11413GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-boundsModerate
MarinerCVE-2025-11414GNU Binutils Linker elflink.c get_link_hash_entry out-of-boundsModerate
MarinerCVE-2025-39938ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failedModerate
MarinerCVE-2025-11495GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflowModerate
MarinerCVE-2025-39934drm: bridge: anx7625: Fix NULL pointer dereference with early IRQModerate
MarinerCVE-2025-39929smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error pathModerate
MarinerCVE-2025-39945cnic: Fix use-after-free bugs in cnic_delete_taskImportant
MarinerCVE-2025-39907mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC bufferCritical
MarinerCVE-2025-39913tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.Moderate
MarinerCVE-2025-39952wifi: wilc1000: avoid buffer overflow in WID string configurationImportant
MarinerCVE-2025-39940dm-stripe: fix a possible integer overflowModerate
MarinerCVE-2025-39953cgroup: split cgroup_destroy_wq into 3 workqueuesModerate
MarinerCVE-2023-53469af_unix: Fix null-ptr-deref in unix_stream_sendpage().Important
MarinerCVE-2025-39914tracing: Silence warning when chunk allocation fails in trace_pid_writeModerate
MarinerCVE-2025-39905net: phylink: add lock for serializing concurrent pl->phydev writes with resolverModerate
MarinerCVE-2025-39920pcmcia: Add error handling for add_interval() in do_validate_mem()Moderate
MarinerCVE-2025-39911i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error pathLow
MarinerCVE-2025-39958iommu/s390: Make attach succeed when the device was surprise removedLow
MarinerCVE-2025-8291ZIP64 End of Central Directory (EOCD) Locator record offset not checkedModerate
MarinerCVE-2025-39957wifi: mac80211: increase scan_ies_len for S1GLow
MarinerCVE-2025-46818Redis: Authenticated users can execute LUA scripts as a different userModerate
MarinerCVE-2025-46817Lua library commands may lead to integer overflow and potential RCEImportant
MarinerCVE-2022-50502mm: /proc/pid/smaps_rollup: fix no vma’s null-derefModerate
MarinerCVE-2025-39944octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()Important
MarinerCVE-2025-11234Qemu-kvm: vnc websocket handshake use-after-freeModerate
MarinerCVE-2025-49844Redis Lua Use-After-Free may lead to remote code executionCritical
MarinerCVE-2025-10729Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVGImportant
MarinerCVE-2025-39961iommu/amd/pgtbl: Fix possible race while increase page table levelModerate
MarinerCVE-2025-61984ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)Low
MarinerCVE-2025-46819Redis is vulnerable to DoS via specially crafted LUA scriptsModerate
MarinerCVE-2025-37727Elasticsearch Insertion of sensitive information in log fileModerate
MarinerCVE-2025-11412GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-boundsModerate
MarinerCVE-2025-39931crypto: af_alg – Set merge to zero early in af_alg_sendmsgModerate
MarinerCVE-2025-39933smb: client: let recv_done verify data_offset, data_length and remaining_data_lengthModerate
MarinerCVE-2025-39947net/mlx5e: Harden uplink netdev access against device unbindModerate
MarinerCVE-2025-61985ssh in OpenSSH before 10.1 allows the ‘\0’ character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.Low
MarinerCVE-2025-10728Uncontrolled recursion in Qt SVG moduleImportant
MarinerCVE-2025-39916mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()Moderate
MarinerCVE-2025-39902mm/slub: avoid accessing metadata when pointer is invalid in object_err()Moderate
MarinerCVE-2025-39923dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/eesModerate
MarinerCVE-2025-39898e1000e: fix heap overflow in e1000_set_eepromCritical
MarinerCVE-2025-39925can: j1939: implement NETDEV_UNREGISTER notification handlerCritical
MarinerCVE-2025-39891wifi: mwifiex: Initialize the chan_stats array to zeroModerate
MarinerCVE-2025-39927ceph: fix race condition validating r_parent before applying stateModerate
MarinerCVE-2025-39901i40e: remove read access to debugfs filesImportant
MarinerCVE-2025-39910mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()Critical
MarinerCVE-2025-39909mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()Moderate
Microsoft Brokering File SystemCVE-2025-48004Microsoft Brokering File System Elevation of Privilege VulnerabilityImportant
Microsoft Brokering File SystemCVE-2025-59189Microsoft Brokering File System Elevation of Privilege VulnerabilityImportant
Microsoft Configuration ManagerCVE-2025-55320Configuration Manager Elevation of Privilege VulnerabilityImportant
Microsoft Configuration ManagerCVE-2025-59213Configuration Manager Elevation of Privilege VulnerabilityImportant
Microsoft Defender for LinuxCVE-2025-59497Microsoft Defender for Linux Denial of Service VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2025-11213Chromium: CVE-2025-11213 Inappropriate implementation in OmniboxUnknown
Microsoft Edge (Chromium-based)CVE-2025-11210Chromium: CVE-2025-11210 Side-channel information leakage in TabUnknown
Microsoft Edge (Chromium-based)CVE-2025-11460Chromium: CVE-2025-11460 Use after free in StorageUnknown
Microsoft Edge (Chromium-based)CVE-2025-11458Chromium: CVE-2025-11458 Heap buffer overflow in SyncUnknown
Microsoft Edge (Chromium-based)CVE-2025-11215Chromium: CVE-2025-11215 Off by one error in V8Unknown
Microsoft Edge (Chromium-based)CVE-2025-11216Chromium: CVE-2025-11216 Inappropriate implementation in StorageUnknown
Microsoft Edge (Chromium-based)CVE-2025-11208Chromium: CVE-2025-11208 Inappropriate implementation in MediaUnknown
Microsoft Edge (Chromium-based)CVE-2025-11212Chromium: CVE-2025-11212 Inappropriate implementation in MediaUnknown
Microsoft Edge (Chromium-based)CVE-2025-11211Chromium: CVE-2025-11211 Out of bounds read in MediaUnknown
Microsoft Edge (Chromium-based)CVE-2025-11205Chromium: CVE-2025-11205 Heap buffer overflow in WebGPUUnknown
Microsoft Edge (Chromium-based)CVE-2025-11207Chromium: CVE-2025-11207 Side-channel information leakage in StorageUnknown
Microsoft Edge (Chromium-based)CVE-2025-11209Chromium: CVE-2025-11209 Inappropriate implementation in OmniboxUnknown
Microsoft Edge (Chromium-based)CVE-2025-11206Chromium: CVE-2025-11206 Heap buffer overflow in VideoUnknown
Microsoft Edge (Chromium-based)CVE-2025-11219Chromium: CVE-2025-11219 Use after free in V8Unknown
Microsoft Exchange ServerCVE-2025-59248Microsoft Exchange Server Spoofing VulnerabilityImportant
Microsoft Exchange ServerCVE-2025-59249Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
Microsoft Exchange ServerCVE-2025-53782Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
Microsoft Failover Cluster Virtual DriverCVE-2025-59260Microsoft Failover Cluster Virtual Driver Information Disclosure VulnerabilityImportant
Microsoft Graphics ComponentCVE-2025-59195Microsoft Graphics Component Denial of Service VulnerabilityImportant
Microsoft Graphics ComponentCVE-2016-9535MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow VulnerabilityCritical
Microsoft Graphics ComponentCVE-2025-59261Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft Graphics ComponentCVE-2025-49708Microsoft Graphics Component Elevation of Privilege VulnerabilityCritical
Microsoft Graphics ComponentCVE-2025-59205Windows Graphics Component Elevation of Privilege VulnerabilityImportant
Microsoft OfficeCVE-2025-59229Microsoft Office Denial of Service VulnerabilityImportant
Microsoft OfficeCVE-2025-59227Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft OfficeCVE-2025-59234Microsoft Office Remote Code Execution VulnerabilityCritical
Microsoft Office ExcelCVE-2025-59223Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59224Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59225Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59232Microsoft Excel Information Disclosure VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59235Microsoft Excel Information Disclosure VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59233Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59231Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2025-59236Microsoft Excel Remote Code Execution VulnerabilityCritical
Microsoft Office ExcelCVE-2025-59243Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office PowerPointCVE-2025-59238Microsoft PowerPoint Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2025-59237Microsoft SharePoint Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2025-59228Microsoft SharePoint Remote Code Execution VulnerabilityImportant
Microsoft Office VisioCVE-2025-59226Microsoft Office Visio Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-59222Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office WordCVE-2025-59221Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft PowerShellCVE-2025-25004PowerShell Elevation of Privilege VulnerabilityImportant
Microsoft WindowsCVE-2025-55701Windows Authentication Elevation of Privilege VulnerabilityImportant
Microsoft Windows Codecs LibraryCVE-2025-54957MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoderImportant
Microsoft Windows Search ComponentCVE-2025-59198Windows Search Service Denial of Service VulnerabilityImportant
Microsoft Windows Search ComponentCVE-2025-59190Windows Search Service Denial of Service VulnerabilityImportant
Microsoft Windows Search ComponentCVE-2025-59253Windows Search Service Denial of Service VulnerabilityImportant
Microsoft Windows SpeechCVE-2025-58715Windows Speech Runtime Elevation of Privilege VulnerabilityImportant
Microsoft Windows SpeechCVE-2025-58716Windows Speech Runtime Elevation of Privilege VulnerabilityImportant
Network Connection Status Indicator (NCSI)CVE-2025-59201Network Connection Status Indicator (NCSI) Elevation of Privilege VulnerabilityImportant
NtQueryInformation Token function (ntifs.h)CVE-2025-55696NtQueryInformation Token function (ntifs.h) Elevation of Privilege VulnerabilityImportant
Redis EnterpriseCVE-2025-59271Redis Enterprise Elevation of Privilege VulnerabilityCritical
Remote Desktop ClientCVE-2025-58718Remote Desktop Client Remote Code Execution VulnerabilityImportant
Software Protection Platform (SPP)CVE-2025-59199Software Protection Platform (SPP) Elevation of Privilege VulnerabilityImportant
Storport.sys DriverCVE-2025-59192Storport.sys Driver Elevation of Privilege VulnerabilityImportant
TCG TPM2.0CVE-2025-2884Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementationImportant
Virtual Secure ModeCVE-2025-48813Virtual Secure Mode Spoofing VulnerabilityImportant
Visual StudioCVE-2025-55240Visual Studio Elevation of Privilege VulnerabilityImportant
Visual StudioCVE-2025-54132GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram ToolImportant
Windows Ancillary Function Driver for WinSockCVE-2025-58714Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows Ancillary Function Driver for WinSockCVE-2025-59242Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
Windows Authentication MethodsCVE-2025-59277Windows Authentication Elevation of Privilege VulnerabilityImportant
Windows Authentication MethodsCVE-2025-59278Windows Authentication Elevation of Privilege VulnerabilityImportant
Windows Authentication MethodsCVE-2025-59275Windows Authentication Elevation of Privilege VulnerabilityImportant
Windows BitLockerCVE-2025-55337Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55332Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55333Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55330Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55338Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows BitLockerCVE-2025-55682Windows BitLocker Security Feature Bypass VulnerabilityImportant
Windows Bluetooth ServiceCVE-2025-59290Windows Bluetooth Service Elevation of Privilege VulnerabilityImportant
Windows Bluetooth ServiceCVE-2025-58728Windows Bluetooth Service Elevation of Privilege VulnerabilityImportant
Windows Bluetooth ServiceCVE-2025-59289Windows Bluetooth Service Elevation of Privilege VulnerabilityImportant
Windows Cloud Files Mini Filter DriverCVE-2025-55680Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityImportant
Windows Cloud Files Mini Filter DriverCVE-2025-55336Windows Cloud Files Mini Filter Driver Information Disclosure VulnerabilityImportant
Windows COMCVE-2025-58725Windows COM+ Event System Service Elevation of Privilege VulnerabilityImportant
Windows Connected Devices Platform ServiceCVE-2025-58727Windows Connected Devices Platform Service Elevation of Privilege VulnerabilityImportant
Windows Core ShellCVE-2025-59185NTLM Hash Disclosure Spoofing VulnerabilityImportant
Windows Core ShellCVE-2025-59244NTLM Hash Disclosure Spoofing VulnerabilityImportant
Windows Cryptographic ServicesCVE-2025-58720Windows Cryptographic Services Information Disclosure VulnerabilityImportant
Windows Device Association Broker serviceCVE-2025-50174Windows Device Association Broker Service Elevation of Privilege VulnerabilityImportant
Windows Device Association Broker serviceCVE-2025-55677Windows Device Association Broker Service Elevation of Privilege VulnerabilityImportant
Windows Digital MediaCVE-2025-53150Windows Digital Media Elevation of Privilege VulnerabilityImportant
Windows Digital MediaCVE-2025-50175Windows Digital Media Elevation of Privilege VulnerabilityImportant
Windows DirectXCVE-2025-55678DirectX Graphics Kernel Elevation of Privilege VulnerabilityImportant
Windows DirectXCVE-2025-55698DirectX Graphics Kernel Denial of Service VulnerabilityImportant
Windows DWMCVE-2025-58722Microsoft DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows DWMCVE-2025-55681Desktop Windows Manager Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2025-59255Windows DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2025-59254Microsoft DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows Error ReportingCVE-2025-55692Windows Error Reporting Service Elevation of Privilege VulnerabilityImportant
Windows Error ReportingCVE-2025-55694Windows Error Reporting Service Elevation of Privilege VulnerabilityImportant
Windows ETL ChannelCVE-2025-59197Windows ETL Channel Information Disclosure VulnerabilityImportant
Windows Failover ClusterCVE-2025-59188Microsoft Failover Cluster Information Disclosure VulnerabilityImportant
Windows Failover ClusterCVE-2025-47979Microsoft Failover Cluster Information Disclosure VulnerabilityImportant
Windows File ExplorerCVE-2025-59214Microsoft Windows File Explorer Spoofing VulnerabilityImportant
Windows File ExplorerCVE-2025-58739Microsoft Windows File Explorer Spoofing VulnerabilityImportant
Windows Health and Optimized Experiences ServiceCVE-2025-59241Windows Health and Optimized Experiences Elevation of Privilege VulnerabilityImportant
Windows HelloCVE-2025-53139Windows Hello Security Feature Bypass VulnerabilityImportant
Windows High Availability ServicesCVE-2025-59184Storage Spaces Direct Information Disclosure VulnerabilityImportant
Windows Hyper-VCVE-2025-55328Windows Hyper-V Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-55679Windows Kernel Information Disclosure VulnerabilityImportant
Windows KernelCVE-2025-55683Windows Kernel Information Disclosure VulnerabilityImportant
Windows KernelCVE-2025-59207Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-55334Windows Kernel Security Feature Bypass VulnerabilityImportant
Windows KernelCVE-2025-59186Windows Kernel Information Disclosure VulnerabilityImportant
Windows KernelCVE-2025-55693Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-59194Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-59187Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-50152Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2025-55699Windows Kernel Information Disclosure VulnerabilityImportant
Windows Local Session Manager (LSM)CVE-2025-58729Windows Local Session Manager (LSM) Denial of Service VulnerabilityImportant
Windows Local Session Manager (LSM)CVE-2025-59257Windows Local Session Manager (LSM) Denial of Service VulnerabilityImportant
Windows Local Session Manager (LSM)CVE-2025-59259Windows Local Session Manager (LSM) Denial of Service VulnerabilityImportant
Windows Management ServicesCVE-2025-59193Windows Management Services Elevation of Privilege VulnerabilityImportant
Windows Management ServicesCVE-2025-59204Windows Management Services Information Disclosure VulnerabilityImportant
Windows MapUrlToZoneCVE-2025-59208Windows MapUrlToZone Information Disclosure VulnerabilityImportant
Windows NDISCVE-2025-55339Windows Network Driver Interface Specification Driver Elevation of Privilege VulnerabilityImportant
Windows NTFSCVE-2025-55335Windows NTFS Elevation of Privilege VulnerabilityImportant
Windows NTLMCVE-2025-59284Windows NTLM Spoofing VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55331Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55689Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55685Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55686Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55690Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55684Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55688Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows PrintWorkflowUserSvcCVE-2025-55691Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityImportant
Windows Push Notification CoreCVE-2025-59209Windows Push Notification Information Disclosure VulnerabilityImportant
Windows Push Notification CoreCVE-2025-59211Windows Push Notification Information Disclosure VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2025-59230Windows Remote Access Connection Manager Elevation of Privilege VulnerabilityImportant
Windows Remote DesktopCVE-2025-58737Remote Desktop Protocol Remote Code Execution VulnerabilityImportant
Windows Remote Desktop ProtocolCVE-2025-55340Windows Remote Desktop Protocol Security Feature BypassImportant
Windows Remote Desktop ServicesCVE-2025-59202Windows Remote Desktop Services Elevation of Privilege VulnerabilityImportant
Windows Remote Procedure CallCVE-2025-59502Remote Procedure Call Denial of Service VulnerabilityModerate
Windows Resilient File System (ReFS)CVE-2025-55687Windows Resilient File System (ReFS) Elevation of Privilege VulnerabilityImportant
Windows Resilient File System (ReFS) Deduplication ServiceCVE-2025-59210Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege VulnerabilityImportant
Windows Resilient File System (ReFS) Deduplication ServiceCVE-2025-59206Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-58717Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2025-55700Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
Windows Secure BootCVE-2025-47827MITRE CVE-2025-47827: Secure Boot bypass in IGEL OS before 11Important
Windows Server Update ServiceCVE-2025-59287Windows Server Update Service (WSUS) Remote Code Execution VulnerabilityCritical
Windows SMB ClientCVE-2025-59280Windows SMB Client Tampering VulnerabilityImportant
Windows SMB ServerCVE-2025-58726Windows SMB Server Elevation of Privilege VulnerabilityImportant
Windows SSDP ServiceCVE-2025-59196Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege VulnerabilityImportant
Windows StateRepository APICVE-2025-59203Windows State Repository API Server File Information Disclosure VulnerabilityImportant
Windows Storage Management ProviderCVE-2025-55325Windows Storage Management Provider Information Disclosure VulnerabilityImportant
Windows Taskbar LiveCVE-2025-59294Windows Taskbar Live Preview Information Disclosure VulnerabilityImportant
Windows USB Video DriverCVE-2025-55676Windows USB Video Class System Driver Information Disclosure VulnerabilityImportant
Windows Virtualization-Based Security (VBS) EnclaveCVE-2025-53717Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege VulnerabilityImportant
Windows WLAN Auto Config ServiceCVE-2025-55695Windows WLAN AutoConfig Service Information Disclosure VulnerabilityImportant
XboxCVE-2025-53768Xbox IStorageService Elevation of Privilege VulnerabilityImportant
XBox Gaming ServicesCVE-2025-59281Xbox Gaming Services Elevation of Privilege VulnerabilityImportant