This report contains detail for the following vulnerabilities:
CVE Issued by | Tag | CVE ID | CVE Title |
---|---|---|---|
Microsoft | .NET | CVE-2025-55247 | .NET Elevation of Privilege Vulnerability |
Microsoft | .NET, .NET Framework, Visual Studio | CVE-2025-55248 | .NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability |
Microsoft | Active Directory Federation Services | CVE-2025-59258 | Windows Active Directory Federation Services (ADFS) Information Disclosure Vulnerability |
Microsoft | Agere Windows Modem Driver | CVE-2025-24990 | Windows Agere Modem Driver Elevation of Privilege Vulnerability |
Microsoft | Agere Windows Modem Driver | CVE-2025-24052 | Windows Agere Modem Driver Elevation of Privilege Vulnerability |
AMD | AMD Restricted Memory Page | CVE-2025-0033 | AMD CVE-2025-0033: RMP Corruption During SNP Initialization |
Microsoft | ASP.NET Core | CVE-2025-55315 | ASP.NET Security Feature Bypass Vulnerability |
Microsoft | Azure Connected Machine Agent | CVE-2025-47989 | Azure Connected Machine Agent Elevation of Privilege Vulnerability |
Microsoft | Azure Connected Machine Agent | CVE-2025-58724 | Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability |
Microsoft | Azure Entra ID | CVE-2025-59218 | Azure Entra ID Elevation of Privilege Vulnerability |
Microsoft | Azure Entra ID | CVE-2025-59246 | Azure Entra ID Elevation of Privilege Vulnerability |
Microsoft | Azure Local | CVE-2025-55697 | Azure Local Elevation of Privilege Vulnerability |
Microsoft | Azure Monitor | CVE-2025-55321 | Azure Monitor Log Analytics Spoofing Vulnerability |
Microsoft | Azure Monitor Agent | CVE-2025-59285 | Azure Monitor Agent Elevation of Privilege Vulnerability |
Microsoft | Azure Monitor Agent | CVE-2025-59494 | Azure Monitor Agent Elevation of Privilege Vulnerability |
Microsoft | Azure PlayFab | CVE-2025-59247 | Azure PlayFab Elevation of Privilege Vulnerability |
Microsoft | Confidential Azure Container Instances | CVE-2025-59292 | Azure Compute Gallery Elevation of Privilege Vulnerability |
Microsoft | Confidential Azure Container Instances | CVE-2025-59291 | Confidential Azure Container Instances Elevation of Privilege Vulnerability |
Microsoft | Connected Devices Platform Service (Cdpsvc) | CVE-2025-59191 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability |
Microsoft | Connected Devices Platform Service (Cdpsvc) | CVE-2025-55326 | Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability |
Microsoft | Connected Devices Platform Service (Cdpsvc) | CVE-2025-58719 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability |
Microsoft | Copilot | CVE-2025-59272 | Copilot Spoofing Vulnerability |
Microsoft | Copilot | CVE-2025-59252 | M365 Copilot Spoofing Vulnerability |
Microsoft | Copilot | CVE-2025-59286 | Copilot Spoofing Vulnerability |
Microsoft | Data Sharing Service Client | CVE-2025-59200 | Data Sharing Service Spoofing Vulnerability |
MITRE | Games | CVE-2025-59489 | MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability |
Microsoft | GitHub | CVE-2025-59288 | Playwright Spoofing Vulnerability |
Microsoft | Inbox COM Objects | CVE-2025-58735 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Microsoft | Inbox COM Objects | CVE-2025-58732 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Microsoft | Inbox COM Objects | CVE-2025-59282 | Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Microsoft | Inbox COM Objects | CVE-2025-58733 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Microsoft | Inbox COM Objects | CVE-2025-58734 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Microsoft | Inbox COM Objects | CVE-2025-58738 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Microsoft | Inbox COM Objects | CVE-2025-58731 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Microsoft | Inbox COM Objects | CVE-2025-58730 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Microsoft | Inbox COM Objects | CVE-2025-58736 | Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability |
Microsoft | Internet Explorer | CVE-2025-59295 | Windows URL Parsing Remote Code Execution Vulnerability |
Microsoft | JDBC Driver for SQL Server | CVE-2025-59250 | JDBC Driver for SQL Server Spoofing Vulnerability |
Linux | Mariner | CVE-2025-39943 | ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer |
Linux | Mariner | CVE-2025-39946 | tls: make sure to abort the stream if headers are bogus |
Linux | Mariner | CVE-2025-39942 | ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size |
Linux | Mariner | CVE-2025-39951 | um: virtio_uml: Fix use-after-free after put_device in probe |
Linux | Mariner | CVE-2025-39932 | smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work) |
Linux | Mariner | CVE-2025-39949 | qed: Don't collect too many protection override GRC elements |
Linux | Mariner | CVE-2025-39937 | net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer |
Linux | Mariner | CVE-2025-39955 | tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). |
Linux | Mariner | CVE-2025-39895 | sched: Fix sched_numa_find_nth_cpu() if mask offline |
VulDB | Mariner | CVE-2025-11413 | GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds |
VulDB | Mariner | CVE-2025-11414 | GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds |
Linux | Mariner | CVE-2025-39938 | ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed |
VulDB | Mariner | CVE-2025-11495 | GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow |
Linux | Mariner | CVE-2025-39934 | drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ |
Linux | Mariner | CVE-2025-39929 | smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path |
Linux | Mariner | CVE-2025-39945 | cnic: Fix use-after-free bugs in cnic_delete_task |
Linux | Mariner | CVE-2025-39907 | mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer |
Linux | Mariner | CVE-2025-39913 | tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. |
Linux | Mariner | CVE-2025-39952 | wifi: wilc1000: avoid buffer overflow in WID string configuration |
Linux | Mariner | CVE-2025-39940 | dm-stripe: fix a possible integer overflow |
Linux | Mariner | CVE-2025-39953 | cgroup: split cgroup_destroy_wq into 3 workqueues |
Linux | Mariner | CVE-2023-53469 | af_unix: Fix null-ptr-deref in unix_stream_sendpage(). |
Linux | Mariner | CVE-2025-39914 | tracing: Silence warning when chunk allocation fails in trace_pid_write |
Linux | Mariner | CVE-2025-39905 | net: phylink: add lock for serializing concurrent pl->phydev writes with resolver |
Linux | Mariner | CVE-2025-39920 | pcmcia: Add error handling for add_interval() in do_validate_mem() |
Linux | Mariner | CVE-2025-39911 | i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path |
Linux | Mariner | CVE-2025-39958 | iommu/s390: Make attach succeed when the device was surprise removed |
PSF | Mariner | CVE-2025-8291 | ZIP64 End of Central Directory (EOCD) Locator record offset not checked |
Linux | Mariner | CVE-2025-39957 | wifi: mac80211: increase scan_ies_len for S1G |
GitHub_M | Mariner | CVE-2025-46818 | Redis: Authenticated users can execute LUA scripts as a different user |
GitHub_M | Mariner | CVE-2025-46817 | Lua library commands may lead to integer overflow and potential RCE |
Linux | Mariner | CVE-2022-50502 | mm: /proc/pid/smaps_rollup: fix no vma's null-deref |
Linux | Mariner | CVE-2025-39944 | octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() |
redhat | Mariner | CVE-2025-11234 | Qemu-kvm: vnc websocket handshake use-after-free |
GitHub_M | Mariner | CVE-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution |
TQtC | Mariner | CVE-2025-10729 | Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG |
Linux | Mariner | CVE-2025-39961 | iommu/amd/pgtbl: Fix possible race while increase page table level |
mitre | Mariner | CVE-2025-61984 | ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.) |
GitHub_M | Mariner | CVE-2025-46819 | Redis is vulnerable to DoS via specially crafted LUA scripts |
elastic | Mariner | CVE-2025-37727 | Elasticsearch Insertion of sensitive information in log file |
VulDB | Mariner | CVE-2025-11412 | GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds |
Linux | Mariner | CVE-2025-39931 | crypto: af_alg - Set merge to zero early in af_alg_sendmsg |
Linux | Mariner | CVE-2025-39933 | smb: client: let recv_done verify data_offset, data_length and remaining_data_length |
Linux | Mariner | CVE-2025-39947 | net/mlx5e: Harden uplink netdev access against device unbind |
mitre | Mariner | CVE-2025-61985 | ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used. |
TQtC | Mariner | CVE-2025-10728 | Uncontrolled recursion in Qt SVG module |
Linux | Mariner | CVE-2025-39916 | mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() |
Linux | Mariner | CVE-2025-39902 | mm/slub: avoid accessing metadata when pointer is invalid in object_err() |
Linux | Mariner | CVE-2025-39923 | dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees |
Linux | Mariner | CVE-2025-39898 | e1000e: fix heap overflow in e1000_set_eeprom |
Linux | Mariner | CVE-2025-39925 | can: j1939: implement NETDEV_UNREGISTER notification handler |
Linux | Mariner | CVE-2025-39891 | wifi: mwifiex: Initialize the chan_stats array to zero |
Linux | Mariner | CVE-2025-39927 | ceph: fix race condition validating r_parent before applying state |
Linux | Mariner | CVE-2025-39901 | i40e: remove read access to debugfs files |
Linux | Mariner | CVE-2025-39910 | mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc() |
Linux | Mariner | CVE-2025-39909 | mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters() |
Microsoft | Microsoft Brokering File System | CVE-2025-48004 | Microsoft Brokering File System Elevation of Privilege Vulnerability |
Microsoft | Microsoft Brokering File System | CVE-2025-59189 | Microsoft Brokering File System Elevation of Privilege Vulnerability |
Microsoft | Microsoft Configuration Manager | CVE-2025-55320 | Configuration Manager Elevation of Privilege Vulnerability |
Microsoft | Microsoft Configuration Manager | CVE-2025-59213 | Configuration Manager Elevation of Privilege Vulnerability |
Microsoft | Microsoft Defender for Linux | CVE-2025-59497 | Microsoft Defender for Linux Denial of Service Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-11213 | Chromium: CVE-2025-11213 Inappropriate implementation in Omnibox |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-11210 | Chromium: CVE-2025-11210 Side-channel information leakage in Tab |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-11460 | Chromium: CVE-2025-11460 Use after free in Storage |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-11458 | Chromium: CVE-2025-11458 Heap buffer overflow in Sync |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-11215 | Chromium: CVE-2025-11215 Off by one error in V8 |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-11216 | Chromium: CVE-2025-11216 Inappropriate implementation in Storage |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-11208 | Chromium: CVE-2025-11208 Inappropriate implementation in Media |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-11212 | Chromium: CVE-2025-11212 Inappropriate implementation in Media |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-11211 | Chromium: CVE-2025-11211 Out of bounds read in Media |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-11205 | Chromium: CVE-2025-11205 Heap buffer overflow in WebGPU |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-11207 | Chromium: CVE-2025-11207 Side-channel information leakage in Storage |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-11209 | Chromium: CVE-2025-11209 Inappropriate implementation in Omnibox |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-11206 | Chromium: CVE-2025-11206 Heap buffer overflow in Video |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-11219 | Chromium: CVE-2025-11219 Use after free in V8 |
Microsoft | Microsoft Exchange Server | CVE-2025-59248 | Microsoft Exchange Server Spoofing Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2025-59249 | Microsoft Exchange Server Elevation of Privilege Vulnerability |
Microsoft | Microsoft Exchange Server | CVE-2025-53782 | Microsoft Exchange Server Elevation of Privilege Vulnerability |
Microsoft | Microsoft Failover Cluster Virtual Driver | CVE-2025-59260 | Microsoft Failover Cluster Virtual Driver Information Disclosure Vulnerability |
Microsoft | Microsoft Graphics Component | CVE-2025-59195 | Microsoft Graphics Component Denial of Service Vulnerability |
MITRE | Microsoft Graphics Component | CVE-2016-9535 | MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow Vulnerability |
Microsoft | Microsoft Graphics Component | CVE-2025-59261 | Windows Graphics Component Elevation of Privilege Vulnerability |
Microsoft | Microsoft Graphics Component | CVE-2025-49708 | Microsoft Graphics Component Elevation of Privilege Vulnerability |
Microsoft | Microsoft Graphics Component | CVE-2025-59205 | Windows Graphics Component Elevation of Privilege Vulnerability |
Microsoft | Microsoft Office | CVE-2025-59229 | Microsoft Office Denial of Service Vulnerability |
Microsoft | Microsoft Office | CVE-2025-59227 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2025-59234 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-59223 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-59224 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-59225 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-59232 | Microsoft Excel Information Disclosure Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-59235 | Microsoft Excel Information Disclosure Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-59233 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-59231 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-59236 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-59243 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office PowerPoint | CVE-2025-59238 | Microsoft PowerPoint Remote Code Execution Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2025-59237 | Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2025-59228 | Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Visio | CVE-2025-59226 | Microsoft Office Visio Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Word | CVE-2025-59222 | Microsoft Word Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Word | CVE-2025-59221 | Microsoft Word Remote Code Execution Vulnerability |
Microsoft | Microsoft PowerShell | CVE-2025-25004 | PowerShell Elevation of Privilege Vulnerability |
Microsoft | Microsoft Windows | CVE-2025-55701 | Windows Authentication Elevation of Privilege Vulnerability |
MITRE | Microsoft Windows Codecs Library | CVE-2025-54957 | MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder |
Microsoft | Microsoft Windows Search Component | CVE-2025-59198 | Windows Search Service Denial of Service Vulnerability |
Microsoft | Microsoft Windows Search Component | CVE-2025-59190 | Windows Search Service Denial of Service Vulnerability |
Microsoft | Microsoft Windows Search Component | CVE-2025-59253 | Windows Search Service Denial of Service Vulnerability |
Microsoft | Microsoft Windows Speech | CVE-2025-58715 | Windows Speech Runtime Elevation of Privilege Vulnerability |
Microsoft | Microsoft Windows Speech | CVE-2025-58716 | Windows Speech Runtime Elevation of Privilege Vulnerability |
Microsoft | Network Connection Status Indicator (NCSI) | CVE-2025-59201 | Network Connection Status Indicator (NCSI) Elevation of Privilege Vulnerability |
Microsoft | NtQueryInformation Token function (ntifs.h) | CVE-2025-55696 | NtQueryInformation Token function (ntifs.h) Elevation of Privilege Vulnerability |
Microsoft | Redis Enterprise | CVE-2025-59271 | Redis Enterprise Elevation of Privilege Vulnerability |
Microsoft | Remote Desktop Client | CVE-2025-58718 | Remote Desktop Client Remote Code Execution Vulnerability |
Microsoft | Software Protection Platform (SPP) | CVE-2025-59199 | Software Protection Platform (SPP) Elevation of Privilege Vulnerability |
Microsoft | Storport.sys Driver | CVE-2025-59192 | Storport.sys Driver Elevation of Privilege Vulnerability |
CERT/CC | TCG TPM2.0 | CVE-2025-2884 | Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation |
Microsoft | Virtual Secure Mode | CVE-2025-48813 | Virtual Secure Mode Spoofing Vulnerability |
Microsoft | Visual Studio | CVE-2025-55240 | Visual Studio Elevation of Privilege Vulnerability |
GitHub | Visual Studio | CVE-2025-54132 | GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram Tool |
Microsoft | Windows Ancillary Function Driver for WinSock | CVE-2025-58714 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
Microsoft | Windows Ancillary Function Driver for WinSock | CVE-2025-59242 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
Microsoft | Windows Authentication Methods | CVE-2025-59277 | Windows Authentication Elevation of Privilege Vulnerability |
Microsoft | Windows Authentication Methods | CVE-2025-59278 | Windows Authentication Elevation of Privilege Vulnerability |
Microsoft | Windows Authentication Methods | CVE-2025-59275 | Windows Authentication Elevation of Privilege Vulnerability |
Microsoft | Windows BitLocker | CVE-2025-55337 | Windows BitLocker Security Feature Bypass Vulnerability |
Microsoft | Windows BitLocker | CVE-2025-55332 | Windows BitLocker Security Feature Bypass Vulnerability |
Microsoft | Windows BitLocker | CVE-2025-55333 | Windows BitLocker Security Feature Bypass Vulnerability |
Microsoft | Windows BitLocker | CVE-2025-55330 | Windows BitLocker Security Feature Bypass Vulnerability |
Microsoft | Windows BitLocker | CVE-2025-55338 | Windows BitLocker Security Feature Bypass Vulnerability |
Microsoft | Windows BitLocker | CVE-2025-55682 | Windows BitLocker Security Feature Bypass Vulnerability |
Microsoft | Windows Bluetooth Service | CVE-2025-59290 | Windows Bluetooth Service Elevation of Privilege Vulnerability |
Microsoft | Windows Bluetooth Service | CVE-2025-58728 | Windows Bluetooth Service Elevation of Privilege Vulnerability |
Microsoft | Windows Bluetooth Service | CVE-2025-59289 | Windows Bluetooth Service Elevation of Privilege Vulnerability |
Microsoft | Windows Cloud Files Mini Filter Driver | CVE-2025-55680 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Cloud Files Mini Filter Driver | CVE-2025-55336 | Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability |
Microsoft | Windows COM | CVE-2025-58725 | Windows COM+ Event System Service Elevation of Privilege Vulnerability |
Microsoft | Windows Connected Devices Platform Service | CVE-2025-58727 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability |
Microsoft | Windows Core Shell | CVE-2025-59185 | NTLM Hash Disclosure Spoofing Vulnerability |
Microsoft | Windows Core Shell | CVE-2025-59244 | NTLM Hash Disclosure Spoofing Vulnerability |
Microsoft | Windows Cryptographic Services | CVE-2025-58720 | Windows Cryptographic Services Information Disclosure Vulnerability |
Microsoft | Windows Device Association Broker service | CVE-2025-50174 | Windows Device Association Broker Service Elevation of Privilege Vulnerability |
Microsoft | Windows Device Association Broker service | CVE-2025-55677 | Windows Device Association Broker Service Elevation of Privilege Vulnerability |
Microsoft | Windows Digital Media | CVE-2025-53150 | Windows Digital Media Elevation of Privilege Vulnerability |
Microsoft | Windows Digital Media | CVE-2025-50175 | Windows Digital Media Elevation of Privilege Vulnerability |
Microsoft | Windows DirectX | CVE-2025-55678 | DirectX Graphics Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows DirectX | CVE-2025-55698 | DirectX Graphics Kernel Denial of Service Vulnerability |
Microsoft | Windows DWM | CVE-2025-58722 | Microsoft DWM Core Library Elevation of Privilege Vulnerability |
Microsoft | Windows DWM | CVE-2025-55681 | Desktop Windows Manager Elevation of Privilege Vulnerability |
Microsoft | Windows DWM Core Library | CVE-2025-59255 | Windows DWM Core Library Elevation of Privilege Vulnerability |
Microsoft | Windows DWM Core Library | CVE-2025-59254 | Microsoft DWM Core Library Elevation of Privilege Vulnerability |
Microsoft | Windows Error Reporting | CVE-2025-55692 | Windows Error Reporting Service Elevation of Privilege Vulnerability |
Microsoft | Windows Error Reporting | CVE-2025-55694 | Windows Error Reporting Service Elevation of Privilege Vulnerability |
Microsoft | Windows ETL Channel | CVE-2025-59197 | Windows ETL Channel Information Disclosure Vulnerability |
Microsoft | Windows Failover Cluster | CVE-2025-59188 | Microsoft Failover Cluster Information Disclosure Vulnerability |
Microsoft | Windows Failover Cluster | CVE-2025-47979 | Microsoft Failover Cluster Information Disclosure Vulnerability |
Microsoft | Windows File Explorer | CVE-2025-59214 | Microsoft Windows File Explorer Spoofing Vulnerability |
Microsoft | Windows File Explorer | CVE-2025-58739 | Microsoft Windows File Explorer Spoofing Vulnerability |
Microsoft | Windows Health and Optimized Experiences Service | CVE-2025-59241 | Windows Health and Optimized Experiences Elevation of Privilege Vulnerability |
Microsoft | Windows Hello | CVE-2025-53139 | Windows Hello Security Feature Bypass Vulnerability |
Microsoft | Windows High Availability Services | CVE-2025-59184 | Storage Spaces Direct Information Disclosure Vulnerability |
Microsoft | Windows Hyper-V | CVE-2025-55328 | Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2025-55679 | Windows Kernel Information Disclosure Vulnerability |
Microsoft | Windows Kernel | CVE-2025-55683 | Windows Kernel Information Disclosure Vulnerability |
Microsoft | Windows Kernel | CVE-2025-59207 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2025-55334 | Windows Kernel Security Feature Bypass Vulnerability |
Microsoft | Windows Kernel | CVE-2025-59186 | Windows Kernel Information Disclosure Vulnerability |
Microsoft | Windows Kernel | CVE-2025-55693 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2025-59194 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2025-59187 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2025-50152 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2025-55699 | Windows Kernel Information Disclosure Vulnerability |
Microsoft | Windows Local Session Manager (LSM) | CVE-2025-58729 | Windows Local Session Manager (LSM) Denial of Service Vulnerability |
Microsoft | Windows Local Session Manager (LSM) | CVE-2025-59257 | Windows Local Session Manager (LSM) Denial of Service Vulnerability |
Microsoft | Windows Local Session Manager (LSM) | CVE-2025-59259 | Windows Local Session Manager (LSM) Denial of Service Vulnerability |
Microsoft | Windows Management Services | CVE-2025-59193 | Windows Management Services Elevation of Privilege Vulnerability |
Microsoft | Windows Management Services | CVE-2025-59204 | Windows Management Services Information Disclosure Vulnerability |
Microsoft | Windows MapUrlToZone | CVE-2025-59208 | Windows MapUrlToZone Information Disclosure Vulnerability |
Microsoft | Windows NDIS | CVE-2025-55339 | Windows Network Driver Interface Specification Driver Elevation of Privilege Vulnerability |
Microsoft | Windows NTFS | CVE-2025-55335 | Windows NTFS Elevation of Privilege Vulnerability |
Microsoft | Windows NTLM | CVE-2025-59284 | Windows NTLM Spoofing Vulnerability |
Microsoft | Windows PrintWorkflowUserSvc | CVE-2025-55331 | Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
Microsoft | Windows PrintWorkflowUserSvc | CVE-2025-55689 | Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
Microsoft | Windows PrintWorkflowUserSvc | CVE-2025-55685 | Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
Microsoft | Windows PrintWorkflowUserSvc | CVE-2025-55686 | Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
Microsoft | Windows PrintWorkflowUserSvc | CVE-2025-55690 | Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
Microsoft | Windows PrintWorkflowUserSvc | CVE-2025-55684 | Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
Microsoft | Windows PrintWorkflowUserSvc | CVE-2025-55688 | Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
Microsoft | Windows PrintWorkflowUserSvc | CVE-2025-55691 | Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
Microsoft | Windows Push Notification Core | CVE-2025-59209 | Windows Push Notification Information Disclosure Vulnerability |
Microsoft | Windows Push Notification Core | CVE-2025-59211 | Windows Push Notification Information Disclosure Vulnerability |
Microsoft | Windows Remote Access Connection Manager | CVE-2025-59230 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability |
Microsoft | Windows Remote Desktop | CVE-2025-58737 | Remote Desktop Protocol Remote Code Execution Vulnerability |
Microsoft | Windows Remote Desktop Protocol | CVE-2025-55340 | Windows Remote Desktop Protocol Security Feature Bypass |
Microsoft | Windows Remote Desktop Services | CVE-2025-59202 | Windows Remote Desktop Services Elevation of Privilege Vulnerability |
Microsoft | Windows Remote Procedure Call | CVE-2025-59502 | Remote Procedure Call Denial of Service Vulnerability |
Microsoft | Windows Resilient File System (ReFS) | CVE-2025-55687 | Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability |
Microsoft | Windows Resilient File System (ReFS) Deduplication Service | CVE-2025-59210 | Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability |
Microsoft | Windows Resilient File System (ReFS) Deduplication Service | CVE-2025-59206 | Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-58717 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-55700 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
MITRE | Windows Secure Boot | CVE-2025-47827 | MITRE CVE-2025-47827: Secure Boot bypass in IGEL OS before 11 |
Microsoft | Windows Server Update Service | CVE-2025-59287 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability |
Microsoft | Windows SMB Client | CVE-2025-59280 | Windows SMB Client Tampering Vulnerability |
Microsoft | Windows SMB Server | CVE-2025-58726 | Windows SMB Server Elevation of Privilege Vulnerability |
Microsoft | Windows SSDP Service | CVE-2025-59196 | Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability |
Microsoft | Windows StateRepository API | CVE-2025-59203 | Windows State Repository API Server File Information Disclosure Vulnerability |
Microsoft | Windows Storage Management Provider | CVE-2025-55325 | Windows Storage Management Provider Information Disclosure Vulnerability |
Microsoft | Windows Taskbar Live | CVE-2025-59294 | Windows Taskbar Live Preview Information Disclosure Vulnerability |
Microsoft | Windows USB Video Driver | CVE-2025-55676 | Windows USB Video Class System Driver Information Disclosure Vulnerability |
Microsoft | Windows Virtualization-Based Security (VBS) Enclave | CVE-2025-53717 | Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability |
Microsoft | Windows WLAN Auto Config Service | CVE-2025-55695 | Windows WLAN AutoConfig Service Information Disclosure Vulnerability |
Microsoft | Xbox | CVE-2025-53768 | Xbox IStorageService Elevation of Privilege Vulnerability |
Microsoft | XBox Gaming Services | CVE-2025-59281 | Xbox Gaming Services Elevation of Privilege Vulnerability |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-47989
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally. FAQ: What privileges could an attacker gain with successful exploitation? An attacker who successfully exploited the vulnerability could elevate their privileges as ‘NT AUTHORITY\SYSTEM’ user and perform arbitrary code execution. What actions do customers need to take to protect themselves from this vulnerability? Customers should update their Azure Connected Machine Agent to the latest version. For more information, see What's new with Azure Connected Machine agent. According to the CVSS metric, the attack vector is local (AV:L) and privileges required is low (PR:L). What does this mean in the context of this elevation of privilege vulnerability? An attacker needs to be authorized as a standard user on the localhost to execute this attack. They could then elevate their privileges to perform unauthorized operations. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-47989 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Arc Enabled Servers - Azure Connected Machine Agent | Release Notes (Security Update) Release Notes (Security Update) |
Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
xxxxx |
No | None |
CVE ID | Acknowledgements |
CVE-2025-47989 | Sharan Patil with WithSecure Consulting |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-0033
MITRE NVD Issuing CNA: AMD |
CVE Title: AMD CVE-2025-0033: RMP Corruption During SNP Initialization
CVSS: CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Executive Summary: Microsoft is aware of AMD-SB-3020 | CVE-2025-0033 disclosed by AMD on October 13, 2025. CVE-2025-0033 is a vulnerability in AMD EPYC processors using Secure Encrypted Virtualization – Secure Nested Paging (SEV-SNP). It involves a race condition during Reverse Map Table (RMP) initialization that could allow a malicious or compromised hypervisor to modify RMP entries before they are locked, potentially impacting the integrity of SEV-SNP guest memory. This issue does not expose plaintext data or secrets and requires privileged control of the hypervisor to exploit. Across Azure Confidential Computing products, multiple security guardrails are in place to prevent host compromise, combining isolation, integrity verification and continuous monitoring. All host operations follow audited and approved management pathways, with administrative access strictly controlled, limited and logged. Together, these protections reduce the risk of host compromise or unauthorized memory manipulation, helping ensure that confidential workloads and customer VMs maintain their confidentiality and integrity on Azure hosts. FAQ: When will an update be available to address this vulnerability? Updates to mitigate this vulnerability in Azure Confidential Computing's (ACC) AMD-based clusters are being developed but are not yet complete. Once complete, the updates with be deployed across all AMD-based infrastructure and customers will be notified via Azure Service Health Alerts if they are required to reboot their ACC resources. The Security Updates table for this CVE will be updated immediately upon availability of the mitigated versions for any affected ACC product SKUs. Additionally, customers who have subscribed to the Security Update Guide will be notified when this CVE is revised to indicate updates are available. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this CVE. Mitigations: None Workarounds: None Revision: 1.0    13-Oct-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-0033 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Confidential Compute VM SKU DCasv5/DCadsv5 | Critical | Remote Code Execution | None | Base: 8.2 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Azure Confidential Compute VM SKU DCasv6/DCadsv6 | Critical | Remote Code Execution | None | Base: 8.2 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Azure Confidential Compute VM SKU ECasv5/ECadsv5 | Critical | Remote Code Execution | None | Base: 8.2 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Azure Confidential Compute VM SKU ECasv6/ECadsv6 | Critical | Remote Code Execution | None | Base: 8.2 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-0033 | Benedict Schlueter, Supraja Sridhara, and Shweta Shinde from ETH Zurich |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-48004
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Executive Summary: Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-48004 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-48004 | hazard Bryan Gonzalez, Ocelot Team @ Metabase Q |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50174
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Device Association Broker Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows Device Association Broker service allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from Medium Integrity Level to Local Service. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50174 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50174 | Jongseong Kim (nevul37) with Ajou University, and working at ENKI WhiteHat Dongjun Kim (smlijun) with Ajou University, and working at ENKI WhiteHat Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53782
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Executive Summary: Incorrect implementation of authentication algorithm in Microsoft Exchange Server allows an unauthorized attacker to elevate privileges locally. FAQ: How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker would be able to take over the mailboxes of all Exchange users, read emails, download attachments. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53782 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5066369 (Security Update) | Important | Elevation of Privilege | 5063223 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.061 |
Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 14 | 5066368 (Security Update) | Important | Elevation of Privilege | 5063222 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1544.036 |
Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 15 | 5066367 (Security Update) | Important | Elevation of Privilege | 5063221 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1748.039 |
Yes | None |
Microsoft Exchange Server Subscription Edition RTM | 5066366 (Security Update) | Important | Elevation of Privilege | 5063224 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.2562.029 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53782 | zcgonvh's cat Vanilla |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55247
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Improper link resolution before file access ('link following') in .NET allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain the privileges of the authenticated user. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authenticated attacker could place a malicious file in the core project path and then wait for a user with admin privileges to create or build a .NET project to gain elevated privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55247 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 8.0 installed on Linux | 5068331 (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.0.21 |
Maybe | None | |
.NET 9.0 installed on Linux | 5068332 (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
9.0.10 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-55247 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55315
MITRE NVD Issuing CNA: Microsoft |
CVE Title: ASP.NET Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.9/TemporalScore:8.6
Executive Summary: Inconsistent interpretation of http requests ('http request/response smuggling') in ASP.NET Core allows an authorized attacker to bypass a security feature over a network. FAQ: How could an attacker exploit the vulnerability? An authenticated attacker could exploit the vulnerability by sending a malicious http request to the web server. According to the CVSS metrics, successful exploitation of this vulnerability could lead to a high loss of confidentiality (C:H), and integrity (I:H) and some loss of availability (A:L). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could view sensitive information such as other user's credentials (Confidentiality) and make changes to file contents on the target server (Integrity), and they might be able to force a crash within the server (Availability). What should I do to make sure my ASP.NET Core application is protected
According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities. What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could smuggle another HTTP request and bypass front-end security controls or hijack other users' credentials. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55315 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
ASP.NET Core 2.3 | Release Notes (Security Update) | Important | Security Feature Bypass | Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C |
2.3.6 |
Maybe | None | |
ASP.NET Core 8.0 | 5068331 (Security Update) | Important | Security Feature Bypass | Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C |
8.0.21 |
Maybe | None | |
ASP.NET Core 9.0 | 5068332 (Security Update) | Important | Security Feature Bypass | Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C |
9.0.10 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.10 | Release Notes (Security Update) | Important | Security Feature Bypass | Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C |
17.10.20 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.12 | Release Notes (Security Update) | Important | Security Feature Bypass | Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C |
17.12.13 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.14 | Release Notes (Security Update) | Important | Security Feature Bypass | Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C |
17.14.17 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-55315 | Sid |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24990
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Agere Modem Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Executive Summary: Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. Fax modem hardware dependent on this specific driver will no longer work on Windows. Microsoft recommends removing any existing dependencies on this hardware. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Is the vulnerability only exploitable if the Agere Modem is actively being used? No. All supported versions of Windows can be affected by a successful exploitation of this vulnerability, even if the modem is not actively being used. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2025-24990 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24990 | Fabian Mosch with r-tec IT Security GmbH
Jordan Jay
Anonymous MSTIC MSTIC Fabian Mosch with r-tec IT Security GmbH Jordan Jay |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24052
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Agere Modem Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.0
Executive Summary: Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update. Fax modem hardware dependent on this specific driver will no longer work on Windows. Microsoft recommends removing any existing dependencies on this hardware. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Is the vulnerability only exploitable if the Agere Modem is actively being used? No. All supported versions of Windows can be affected by a successful exploitation of this vulnerability, even if the modem is not actively being used. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24052 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24052 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55320
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Configuration Manager Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain sysadmin privileges. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by injecting malicious SQL into the SyncToken method, allowing execution of arbitrary queries as the SMS service. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55320 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Configuration Manager 2403 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
5.00.9128.1035 |
Maybe | None | |
Microsoft Configuration Manager 2409 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
5.00.9132.1029 |
Maybe | None | |
Microsoft Configuration Manager 2503 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
5.00.9135.1008 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-55320 | Mehdi Elyassa with Synacktiv |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55325
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Storage Management Provider Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Buffer over-read in Windows Storage Management Provider allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55325 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55325 | nerty_nerty(Ingyu Yang), Mukyoung Kwak, Seongheun Hong, Jaeseok Bae, Jiwon Jang, Seoyun Cho with Best of the Best 13th Team MSRC Gasan insu with Theori Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55333
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows BitLocker Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Executive Summary: Incomplete comparison with missing factors in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55333 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Security Feature Bypass | 5065430 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Security Feature Bypass | 5065430 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Security Feature Bypass | 5065427 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Security Feature Bypass | 5065427 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Security Feature Bypass | 5065427 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Security Feature Bypass | 5065427 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Security Feature Bypass | 5065432 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Security Feature Bypass | 5065432 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Security Feature Bypass | 5065425 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55333 | Alon Leviev with Microsoft (STORM) Alon Leviev with Microsoft (STORM) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55335
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows NTFS Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Executive Summary: Use after free in Windows NTFS allows an unauthorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55335 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55335 | Bruno Botelho |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55336
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows Cloud Files Mini Filter Driver allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55336 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55336 | Chen Le Qi (@cplearns2h4ck) with STAR Labs SG Pte. Ltd. |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55338
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows BitLocker Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Executive Summary: Missing Ability to Patch ROM Code in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55338 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Security Feature Bypass | 5065430 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Security Feature Bypass | 5065430 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Security Feature Bypass | 5065427 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Security Feature Bypass | 5065427 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Security Feature Bypass | 5065427 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Security Feature Bypass | 5065427 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Security Feature Bypass | 5065432 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Security Feature Bypass | 5065432 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Security Feature Bypass | 5065425 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55338 | Netanel Ben Simon with Microsoft (STORM) Alon Leviev with Microsoft (STORM) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55339
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Network Driver Interface Specification Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Out-of-bounds read in Windows NDIS allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55339 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55339 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55340
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Desktop Protocol Security Feature Bypass
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Improper authentication in Windows Remote Desktop Protocol allows an authorized attacker to bypass a security feature locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires multiple conditions to be met. The attacker must have access to a user's machine and the user must have initiated an RDP session. The attack must also be carried out within a certain amount of time from the initiation of the RDP session. What kind of security feature could be bypassed by successfully exploiting this vulnerability? This vulnerability could allow an attacker to bypass RDP authentication. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55340 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022 | 5066782 (Security Update) | Important | Security Feature Bypass | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Security Feature Bypass | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Security Feature Bypass | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55340 | Toaster |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55676
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows USB Video Class System Driver Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Generation of error message containing sensitive information in Windows USB Video Driver allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55676 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55676 | Chunyang Han |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55677
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Device Association Broker Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Untrusted pointer dereference in Windows Device Association Broker service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from Medium Integrity Level to Local Service. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55677 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55677 | Hwiwon Lee (hwiwonl), SEC-agent team Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55681
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Desktop Windows Manager Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Out-of-bounds read in Windows DWM allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to manipulate system operations in a specific manner. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55681 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55681 | TyphoonPWN Windows PE Winner with SSD Secure Disclosure |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55685
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55685 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55685 | Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat Hwiwon Lee (hwiwonl), SEC-agent team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55686
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55686 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55686 | Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat Hwiwon Lee (hwiwonl), SEC-agent team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55687
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Resilient File System (ReFS) allows an unauthorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55687 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55687 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55689
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55689 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55689 | Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat Hwiwon Lee (hwiwonl), SEC-agent team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55700
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55700 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Information Disclosure | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Information Disclosure | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Information Disclosure | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Information Disclosure | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Information Disclosure | 5065468 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Information Disclosure | 5065468 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Information Disclosure | 5065509 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Information Disclosure | 5065509 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Information Disclosure | 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Information Disclosure | 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55700 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55701
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Authentication Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper validation of specified type of input in Microsoft Windows allows an authorized attacker to elevate privileges locally. FAQ: How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55701 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55701 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58715
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Speech Runtime Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Integer overflow or wraparound in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to a contained execution environment escape. Please refer to AppContainer Isolation for more information. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58715 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58715 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58716
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Speech Runtime Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Improper input validation in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to a contained execution environment escape. Please refer to AppContainer Isolation for more information. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58716 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58716 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58717
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58717 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Information Disclosure | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Information Disclosure | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Information Disclosure | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Information Disclosure | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Information Disclosure | 5065468 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Information Disclosure | 5065468 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Information Disclosure | 5065509 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Information Disclosure | 5065509 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Information Disclosure | 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Information Disclosure | 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58717 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58719
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.1
Executive Summary: Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metrics, successful exploitation of this vulnerability does not impact confidentiality (C:N), or integrity (I:N), but has a high impact on availability (A:H). What does that mean for this vulnerability? An attacker who successfully exploits this vulnerability cannot access or modify any sensitive user data but can cause user data to become unavailable. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58719 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58719 | Zhang WangJunJie, He YiSheng with Hillstone Networks Security Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58722
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Windows DWM allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58722 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58722 | Varun Goel Samuel Pope with MSRC |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58728
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Bluetooth Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58728 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58728 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58732
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58732 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Remote Code Execution | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Remote Code Execution | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Remote Code Execution | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58732 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58735
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58735 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Remote Code Execution | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Remote Code Execution | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Remote Code Execution | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58735 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59185
MITRE NVD Issuing CNA: Microsoft |
CVE Title: NTLM Hash Disclosure Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user interacting with the file in multiple ways will cause the NTLM hash to be leaked. A few interactions which trigger this leak include:
Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59185 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Spoofing | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Spoofing | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Spoofing | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Spoofing | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Spoofing | 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Spoofing | 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Spoofing | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Spoofing | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Spoofing | 5065425 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59185 | Nacl |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59186
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59186 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59186 | Lewis Lee, Ver and Zhiniang Peng of HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59195
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Graphics Component Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to deny service locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59195 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Denial of Service | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Denial of Service | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Denial of Service | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59195 | cyanbamboo |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59196
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SSDP Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59196 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59196 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59199
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Software Protection Platform (SPP) Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper access control in Software Protection Platform (SPP) allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could elevate from a low integrity level up to a medium integrity level. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59199 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59199 | Yarin Aharoni with SafeBreach |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59200
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Data Sharing Service Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.7/TemporalScore:6.7
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Data Sharing Service Client allows an unauthorized attacker to perform spoofing locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click a specially crafted button for the attacker to successfully exploit the vulnerability. According to the CVSS metric, successful exploitation could lead to some loss of availability and confidentiality and a total loss of integrity. What does that mean for the vulnerability? Successful exploitation of this vulnerability enables an attacker to access data and disrupt services at a medium integrity level, resulting in some loss of confidentiality and availability. However, because the attacker can execute arbitrary code at that level, the vulnerability poses a total loss of integrity, allowing for potentially significant data manipulation. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59200 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Spoofing | 5065430 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Spoofing | 5065430 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Spoofing | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Spoofing | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Spoofing | 5065432 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Spoofing | 5065432 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Spoofing | 5065425 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59200 | Ron Benyizhak with Safebreach |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59201
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Network Connection Status Indicator (NCSI) Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper access control in Network Connection Status Indicator (NCSI) allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could execute code in the security context of the “NT AUTHORITY\Network Service” account. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59201 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59201 | T0 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59202
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Desktop Services Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows Remote Desktop Services allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59202 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59202 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59204
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Management Services Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Use of uninitialized resource in Windows Management Services allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59204 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59204 | Taewoo (Tae_ω02) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59206
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59206 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59206 | Taewoo (Tae_ω02) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59207
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59207 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59207 | ChenJian with Sea Security Orca Team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59211
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Push Notification Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59211 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Information Disclosure | 5065509 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Information Disclosure | 5065509 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Information Disclosure | 5065507 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Information Disclosure | 5065507 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59211 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59228
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability? The attack vector is Network (AV:N) because this vulnerability is remotely exploitable and can be exploited from the internet. The attack complexity is Low (AC:L) because an attacker does not require significant prior knowledge of the system and can achieve repeatable success with the payload against the vulnerable component. I am running SharePoint Server 2016. Do the updates for SharePoint Enterprise Server 2016 also apply to the version I am running? Yes. The same KB number applies to both SharePoint Server 2016 and SharePoint Enterprise Server 2016. Customers running either version should install the security update to be protected from this vulnerability. How could an attacker exploit the vulnerability? In a network-based attack, an authenticated attacker, who has a minimum of Site Member permissions (PR:L), could execute code remotely on the SharePoint Server. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59228 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Enterprise Server 2016 | 5002788 (Security Update) | Important | Remote Code Execution | 5002778 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002796 (Security Update) | Important | Remote Code Execution | 5002775 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20059 |
Maybe | None |
Microsoft SharePoint Server Subscription Edition | 5002786 (Security Update) | Important | Remote Code Execution | 5002784 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.19127.20262 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59228 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59231
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59231 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002794 (Security Update) | Important | Remote Code Execution | 5002782 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002794 (Security Update) | Important | Remote Code Execution | 5002782 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Office Online Server | 5002797 (Security Update) | Important | Remote Code Execution | 5002776 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20059 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59231 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59233
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59233 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002794 (Security Update) | Important | Remote Code Execution | 5002782 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002794 (Security Update) | Important | Remote Code Execution | 5002782 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Office Online Server | 5002797 (Security Update) | Important | Remote Code Execution | 5002776 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20059 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59233 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59234
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59234 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002792 (Security Update) | Critical | Remote Code Execution | 5002781 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002792 (Security Update) | Critical | Remote Code Execution | 5002781 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office for Android | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.19328.20000 |
Maybe | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59234 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59235
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59235 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Access 2016 (32-bit edition) | 5002720 (Security Update) | Important | Information Disclosure | 5002701 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Access 2016 (64-bit edition) | 5002720 (Security Update) | Important | Information Disclosure | 5002701 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Excel 2016 (32-bit edition) | 5002794 (Security Update) 5002719 (Security Update) 5002757 (Security Update) 5002341 (Security Update) |
Important | Information Disclosure | 5002782 5002588 5002734 5002052 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002794 (Security Update) 5002719 (Security Update) 5002757 (Security Update) 5002341 (Security Update) |
Important | Information Disclosure | 5002782 5002588 5002734 5002052 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft SharePoint Enterprise Server 2016 | 5002788 (Security Update) | Important | Information Disclosure | 5002778 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002796 (Security Update) | Important | Information Disclosure | 5002775 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.10417.20059 |
Maybe | None |
Office Online Server | 5002797 (Security Update) | Important | Information Disclosure | 5002776 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.10417.20059 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59235 | Nathan Shomber of Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59236
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Executive Summary: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59236 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Office Online Server | 5002797 (Security Update) | Critical | Remote Code Execution | 5002776 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20059 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59236 | Nathan Shomber of Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59237
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. FAQ: How could an attacker exploit the vulnerability? In a network-based attack, an attacker authenticated as at least a Site Owner, could write arbitrary code to inject and execute code remotely on the SharePoint Server. I am running SharePoint Server 2016. Do the updates for SharePoint Enterprise Server 2016 also apply to the version I am running? Yes. The same KB number applies to both SharePoint Server 2016 and SharePoint Enterprise Server 2016. Customers running either version should install the security update to be protected from this vulnerability. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59237 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Enterprise Server 2016 | 5002788 (Security Update) | Important | Remote Code Execution | 5002778 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002796 (Security Update) | Important | Remote Code Execution | 5002775 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20059 |
Maybe | None |
Microsoft SharePoint Server Subscription Edition | 5002786 (Security Update) | Important | Remote Code Execution | 5002784 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.19127.20262 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59237 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59242
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59242 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59242 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-49708
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Graphics Component Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.9/TemporalScore:8.6
Executive Summary: Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges over a network. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. How could an attacker exploit this vulnerability? An attacker can exploit this vulnerability by getting access to the local guest VM so they can attack the Host OS. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? Compromising the host enables an attacker to impact other virtual machines running on the same host, even if those VMs are not directly vulnerable to this issue. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49708 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Critical | Elevation of Privilege | 5065428 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Critical | Elevation of Privilege | 5065428 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Critical | Elevation of Privilege | 5065429 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Critical | Elevation of Privilege | 5065429 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Critical | Elevation of Privilege | 5065429 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Critical | Elevation of Privilege | 5065429 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Critical | Elevation of Privilege | 5065429 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Critical | Elevation of Privilege | 5065429 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Critical | Elevation of Privilege | 5065431 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Critical | Elevation of Privilege | 5065431 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Critical | Elevation of Privilege | 5065431 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Critical | Elevation of Privilege | 5065431 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Critical | Elevation of Privilege | 5065426 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Critical | Elevation of Privilege | 5065426 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Critical | Elevation of Privilege | Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Critical | Elevation of Privilege | Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Critical | Elevation of Privilege | 5065428 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Critical | Elevation of Privilege | 5065428 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Critical | Elevation of Privilege | 5065432 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Critical | Elevation of Privilege | 5065432 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Critical | Elevation of Privilege | 5065425 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Critical | Elevation of Privilege | 5065426 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Critical | Elevation of Privilege | 5065426 |
Base: 9.9 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-49708 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59243
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59243 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None |
CVE ID | Acknowledgements |
CVE-2025-59243 | 4n0nym4u5 with Zscaler |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59249
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Weak authentication in Microsoft Exchange Server allows an authorized attacker to elevate privileges over a network. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker would be able to take over the mailboxes of all Exchange users, attackers can send emails, read emails, download attachments. How could an attacker exploit this vulnerability? An attacker would first have to compromise with a user account who is member of an admin group to run the required code. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59249 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5066369 (Security Update) | Important | Elevation of Privilege | 5063223 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.01.2507.061 |
Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 14 | 5066368 (Security Update) | Important | Elevation of Privilege | 5063222 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1544.036 |
Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 15 | 5066367 (Security Update) | Important | Elevation of Privilege | 5063221 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.1748.039 |
Yes | None |
Microsoft Exchange Server Subscription Edition RTM | 5066366 (Security Update) | Important | Elevation of Privilege | 5063224 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.02.2562.029 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59249 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59250
MITRE NVD Issuing CNA: Microsoft |
CVE Title: JDBC Driver for SQL Server Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: Improper input validation in JDBC Driver for SQL Server allows an unauthorized attacker to perform spoofing over a network. FAQ: How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking a victim into connecting to a malicious server using techniques like DNS poisoning or phishing. Once connected, the attacker presents a legitimate TLS certificate with a spoofed Common Name (CN) in the Organizational Unit (OU) field. The JDBC driver mistakenly trusts this certificate, allowing the attacker to intercept SQL credentials and perform a machine-in-the-middle attack on encrypted database traffic. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59250 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft JDBC Driver 10.2 for SQL Server | Release Notes (Security Update) | Important | Spoofing | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.2.4 |
No | None | |
Microsoft JDBC Driver 11.2 for SQL Server | Release Notes (Security Update) | Important | Spoofing | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
11.2.4 |
No | None | |
Microsoft JDBC Driver 12.10 for SQL Server | Release Notes (Security Update) | Important | Spoofing | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
12.10.2 |
No | None | |
Microsoft JDBC Driver 12.2 for SQL Server | Release Notes (Security Update) | Important | Spoofing | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
12.2.1 |
No | None | |
Microsoft JDBC Driver 12.4 for SQL Server | Release Notes (Security Update) | Important | Spoofing | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
12.4.3 |
No | None | |
Microsoft JDBC Driver 12.6 for SQL Server | Release Notes (Security Update) | Important | Spoofing | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
12.6.5 |
No | None | |
Microsoft JDBC Driver 12.8 for SQL Server | Release Notes (Security Update) | Important | Spoofing | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
12.8.2 |
No | None | |
Microsoft JDBC Driver 13.2 for SQL Server | Release Notes (Security Update) | Important | Spoofing | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
13.2.1 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-59250 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59254
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59254 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59254 | namnp with Viettel Cyber Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59255
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59255 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59255 | namnp with Viettel Cyber Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54957
MITRE NVD Issuing CNA: MITRE |
CVE Title: MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Deserialization of untrusted data in Microsoft Windows Codecs Library allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54957 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Remote Code Execution | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54957 | Dolby Laboratories working with the original identifiers Ivan Fratric and Natalie Silvanovich of Google Project Zero |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59257
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Local Session Manager (LSM) Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59257 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Denial of Service | 5065425 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59257 | Hussein Alrubaye with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59258
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Active Directory Federation Services (ADFS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.2/TemporalScore:5.4
Executive Summary: Insertion of sensitive information into log file in Active Directory Federation Services allows an unauthorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could obtain Single Sign-On (SSO) cookies in ADFS logs. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59258 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Information Disclosure | 5065509 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Information Disclosure | 5065509 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Information Disclosure | 5065507 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Information Disclosure | 5065507 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59258 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59259
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Local Session Manager (LSM) Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59259 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Denial of Service | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Denial of Service | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Denial of Service | 5065509 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Denial of Service | 5065509 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Denial of Service | 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Denial of Service | 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Denial of Service | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Denial of Service | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Denial of Service | 5065425 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59259 | Hussein Alrubaye with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59277
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Authentication Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. FAQ: How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59277 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59277 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59280
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows SMB Client Tampering Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:3.1/TemporalScore:2.7
Executive Summary: Improper authentication in Windows SMB Client allows an unauthorized attacker to perform tampering over a network. FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability? Data Tampering when connecting to a SMB2 Server which doesn't support SMB Multi-protocol negotiate. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Tampering |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59280 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Tampering | 5065430 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Tampering | 5065430 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Tampering | 5065427 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Tampering | 5065427 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Tampering | 5065428 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Tampering | 5065428 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Tampering | 5065429 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Tampering | 5065429 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Tampering | 5065429 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Tampering | 5065429 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Tampering | 5065429 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Tampering | 5065429 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Tampering | 5065431 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Tampering | 5065431 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Tampering | 5065431 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Tampering | 5065431 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Tampering | 5065426 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Tampering | 5065426 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Tampering | 5065508 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Tampering | 5065508 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Tampering | 5065508 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Tampering | 5065508 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Tampering | 5065468 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Tampering | 5065468 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Tampering | 5065509 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Tampering | 5065509 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Tampering | 5065507 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Tampering | 5065507 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Tampering | 5065427 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Tampering | 5065427 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Tampering | 5065428 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Tampering | 5065428 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Tampering | 5065432 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Tampering | 5065432 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Tampering | 5065425 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Tampering | 5065426 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Tampering | 5065426 |
Base: 3.1 Temporal: 2.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59280 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-47979
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Failover Cluster Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Insertion of sensitive information into log file in Windows Failover Cluster allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker that successfully exploited this vulnerability could recover any data that is put in the system logs on the Compute Instance including cleartext passwords. What further actions should I take to protect my environment after applying the fix? Even after applying the security update, residual sensitive information may still exist in system logs. We strongly recommend that administrator users change their passwords to mitigate any potential risk from previously exposed credentials. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-47979 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-47979 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-54132
MITRE NVD Issuing CNA: GitHub |
CVE Title: GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram Tool
CVSS: CVSS:3.1 Highest BaseScore:4.4/TemporalScore:4.4
Executive Summary: Cursor is a code editor built for programming with AI. In versions below 1.3, Mermaid (which is used to render diagrams) allows embedding images which then get rendered by Cursor in the chat box. An attacker can use this to exfiltrate sensitive information to a third-party attacker controlled server through an image fetch after successfully performing a prompt injection. A malicious model (or hallucination/backdoor) might also trigger this exploit at will. This issue requires prompt injection from malicious data (web, image upload, source code) to be exploited. In that case, it can send sensitive information to an attacker-controlled external server. GitHub created this CVE on their behalf. The documented Visual Studio updates incorporate updates in Mermaid which address this vulnerability. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54132 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2022 version 17.14 | Release Notes (Security Update) | Important | Information Disclosure | Base: 4.4 Temporal: 4.4 Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N |
17.14.17 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-54132 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59281
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Xbox Gaming Services Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper link resolution before file access ('link following') in XBox Gaming Services allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would be able to delete targeted files on a system. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59281 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Xbox Gaming Services | Store (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
31.105.17001.0 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59281 | Dominic Littlewood |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59282
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Inbox COM Objects allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation: Customers who have not enabled Internet Information Services (IIS) are not vulnerable to this attack. Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59282 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Remote Code Execution | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Remote Code Execution | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Remote Code Execution | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59282 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59284
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows NTLM Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:3.3/TemporalScore:2.9
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59284 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 3.3 Temporal: 2.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 3.3 Temporal: 2.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 3.3 Temporal: 2.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 3.3 Temporal: 2.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 3.3 Temporal: 2.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 3.3 Temporal: 2.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Spoofing | Base: 3.3 Temporal: 2.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Spoofing | Base: 3.3 Temporal: 2.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 3.3 Temporal: 2.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 3.3 Temporal: 2.9 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59284 | lyntc and _ozb_ working with Trend Zero Day Initiative Len Sadowski and Oguz Bektas with Trend Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-11212
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-11212 Inappropriate implementation in Media
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11212 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
141.0.3537.57 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-11212 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-11211
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-11211 Out of bounds read in Media
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11211 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
141.0.3537.57 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-11211 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-11209
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-11209 Inappropriate implementation in Omnibox
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11209 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
141.0.3537.57 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-11209 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-11205
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-11205 Heap buffer overflow in WebGPU
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11205 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
141.0.3537.57 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-11205 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||
CVE-2025-59288
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Playwright Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.9
Executive Summary: Improper verification of cryptographic signature in GitHub allows an unauthorized attacker to perform spoofing over an adjacent network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack. According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability? This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Moderate | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59288 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
microsoft/playwright | Repo (Security Update) | Moderate | Spoofing | Base: 5.3 Temporal: 4.9 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RC:C |
1.55.1 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59288 | Jonathan Leitschuh with Socket |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59290
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Bluetooth Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. This CVE was addressed by updates that were released in September 2025, but the CVE was inadvertently omitted from the September 2025 Security Updates. This is an informational change only. Customers who have already installed the September 2025 updates do not need to take any further action. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59290 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59290 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59291
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Confidential Azure Container Instances Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Executive Summary: External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally. FAQ: How could an attacker exploit this vulnerability? An attacker could trick the system into mounting a malicious file share to a sensitive location, allowing them to run harmful code. What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker could gain code execution within the confidential ACI sidecar container, escalating from host control to confidential containers. According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? A successful attack allows the container host to execute code in the targeted guest environment. What actions need to be taken to mitigate this vulnerability? To ensure secure and compliant use of Confidential virtual nodes on Azure Container Instances, customers must take the following actions: 1. Update Helm Charts
2. Regenerate CCE PolicyIf you are using Confidential ACI or Confidential virtual nodes, you must regenerate your Confidential Compute Environment (CCE) policy with a minimum infrastructure fragment SVN of 4. To do this: 1. Update the Azure CLI confcom extension to version 1.2.8 or later:
Alternatively, you can manually set the infrastructure SVN using:
2. Regenerate the CCE policy using either an ARM template or YAML file, depending on your deployment method. 3. Update any dependent key release policies, such as those using x-ms-sevsnpvm-hostdata claim checks in a Managed HSM (mHSM) key release policy. 4. Re-deploy your workload to apply the updated policy and configuration. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59291 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Compute Gallery | Critical | Elevation of Privilege | None | Base: 8.2 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-59291 | Microsoft Offensive Research & Security Engineering |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59292
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Compute Gallery Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Executive Summary: External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker could gain code execution within the confidential ACI sidecar container, escalating from host control to confidential containers. How could an attacker exploit this vulnerability? An attacker could trick the system into mounting a malicious file share to a sensitive location, allowing them to run harmful code. According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? A successful attack allows the container host to execute code in the targeted guest environment. What actions need to be taken to mitigate this vulnerability? To ensure secure and compliant use of Confidential virtual nodes on Azure Container Instances, customers must take the following actions: 1. Update Helm Charts
2. Regenerate CCE PolicyIf you are using Confidential ACI or Confidential virtual nodes, you must regenerate your Confidential Compute Environment (CCE) policy with a minimum infrastructure fragment SVN of 4. To do this: 1. Update the Azure CLI confcom extension to version 1.2.8 or later:
Alternatively, you can manually set the infrastructure SVN using:
2. Regenerate the CCE policy using either an ARM template or YAML file, depending on your deployment method. 3. Update any dependent key release policies, such as those using x-ms-sevsnpvm-hostdata claim checks in a Managed HSM (mHSM) key release policy. 4. Re-deploy your workload to apply the updated policy and configuration. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59292 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Compute Gallery | Critical | Elevation of Privilege | None | Base: 8.2 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-59292 | Microsoft Offensive Research & Security Engineering |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59294
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Taskbar Live Preview Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:2.1/TemporalScore:1.9
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows Taskbar Live allows an unauthorized attacker to disclose information with a physical attack. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is secrets or privileged information belonging to the user of the affected application. According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability? An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability). According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user would need to physically access the device after the user has hovered over a taskbar preview and then locked the screen or put the device to sleep, potentially exposing the application window on the lock screen. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59294 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 2.1 Temporal: 1.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59294 | Ludwig Andrew Haigh with Aptean PeterAS17 with https://www.peteras17.me/ Anthony Juanelli |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59295
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows URL Parsing Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Heap-based buffer overflow in Internet Explorer allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click a specially crafted button for the attacker to successfully exploit the vulnerability. According to the CVSS metric, the attack vector is network (AV:N) and user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a user to open a specially crafted file from the attacker to initiate remote code execution. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability within the Workstation Service component to cause arbitrary memory write or control flow hijacking, resulting in privilege escalation. This could potentially allow the attacker to execute code with elevated privileges, compromising the security of the system. The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2? While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms. To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59295 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) 5066840 (IE Cumulative) |
Important | Remote Code Execution | 5065508 5065435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 1.000 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) 5066840 (IE Cumulative) |
Important | Remote Code Execution | 5065508 5065435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 1.000 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) 5066840 (IE Cumulative) |
Important | Remote Code Execution | 5065508 5065435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 1.000 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) 5066840 (IE Cumulative) |
Important | Remote Code Execution | 5065508 5065435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 1.000 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066840 (IE Cumulative) 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065435 5065468 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.000 6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066840 (IE Cumulative) 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065435 5065468 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.000 6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066840 (IE Cumulative) 5066875 (Monthly Rollup) |
Important | Remote Code Execution | 5065435 5065509 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.000 6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066840 (IE Cumulative) 5066875 (Monthly Rollup) |
Important | Remote Code Execution | 5065435 5065509 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.000 6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066840 (IE Cumulative) 5066873 (Monthly Rollup) |
Important | Remote Code Execution | 5065435 5065507 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.000 6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066840 (IE Cumulative) 5066873 (Monthly Rollup) |
Important | Remote Code Execution | 5065435 5065507 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.000 6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Remote Code Execution | 5065425 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59295 | j00sean |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59494
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Monitor Agent Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper access control in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? A successful exploitation of this vulnerability allows a regular user on an Arc-enabled VM to read any file on the system with NT SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59494 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Monitor Agent | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.38.1.0 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59494 | Michal Kamensky with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2016-9535
MITRE NVD Issuing CNA: MITRE |
CVE Title: MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.0/TemporalScore:4.0
Executive Summary: tif_predict.h and tif_predict.c in libtiff 4.0.6 have assertions that can lead to assertion failures in debug mode, or buffer overflows in release mode, when dealing with unusual tile size like YCbCr with subsampling. Reported as MSVR 35105, aka "Predictor heap-buffer-overflow." MITRE created this CVE on their behalf. The documented Windows updates incorporate updates in LibTIFF which address this vulnerability. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2016-9535 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Critical | Remote Code Execution | 5065430 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Critical | Remote Code Execution | 5065430 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Critical | Remote Code Execution | 5065427 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Critical | Remote Code Execution | 5065427 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Critical | Remote Code Execution | 5065428 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Critical | Remote Code Execution | 5065428 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Critical | Remote Code Execution | 5065429 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Critical | Remote Code Execution | 5065429 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Critical | Remote Code Execution | 5065429 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Critical | Remote Code Execution | 5065429 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Critical | Remote Code Execution | 5065429 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Critical | Remote Code Execution | 5065429 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Critical | Remote Code Execution | 5065431 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Critical | Remote Code Execution | 5065431 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Critical | Remote Code Execution | 5065431 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Critical | Remote Code Execution | 5065431 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Critical | Remote Code Execution | 5065426 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Critical | Remote Code Execution | 5065426 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Critical | Remote Code Execution | Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Critical | Remote Code Execution | Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Critical | Remote Code Execution | 5065508 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Critical | Remote Code Execution | 5065508 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Critical | Remote Code Execution | 5065508 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Critical | Remote Code Execution | 5065508 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Critical | Remote Code Execution | 5065468 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Critical | Remote Code Execution | 5065468 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Critical | Remote Code Execution | 5065509 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Critical | Remote Code Execution | 5065509 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Critical | Remote Code Execution | 5065507 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Critical | Remote Code Execution | 5065507 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Critical | Remote Code Execution | 5065427 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Critical | Remote Code Execution | 5065427 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Critical | Remote Code Execution | 5065428 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Critical | Remote Code Execution | 5065428 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Critical | Remote Code Execution | 5065432 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Critical | Remote Code Execution | 5065432 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Critical | Remote Code Execution | 5065425 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Critical | Remote Code Execution | 5065426 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Critical | Remote Code Execution | 5065426 |
Base: 4.0 Temporal: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2016-9535 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-11460
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-11460 Use after free in Storage
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    09-Oct-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11460 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
141.0.3537.71 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-11460 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-11458
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-11458 Heap buffer overflow in Sync
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    09-Oct-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11458 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
141.0.3537.71 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-11458 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59502
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Remote Procedure Call Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. This CVE was addressed by updates that were released in September 2025, but the CVE was inadvertently omitted from the September 2025 Security Updates. This is an informational change only. Customers who have already installed the September 2025 updates do not need to take any further action. |
Moderate | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59502 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Moderate | Denial of Service | 5063877 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Moderate | Denial of Service | 5063877 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Moderate | Denial of Service | 5063709 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Moderate | Denial of Service | 5063709 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Moderate | Denial of Service | 5063709 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Moderate | Denial of Service | 5063709 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Moderate | Denial of Service | 5063709 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Moderate | Denial of Service | 5063709 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Moderate | Denial of Service | 5063875 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Moderate | Denial of Service | 5063875 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Moderate | Denial of Service | 5063875 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Moderate | Denial of Service | 5063875 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Moderate | Denial of Service | 5063878 5064010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Moderate | Denial of Service | 5063878 5064010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Moderate | Denial of Service | 5063877 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Moderate | Denial of Service | 5063877 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (Security Hotpatch Update) |
Moderate | Denial of Service | 5063880 5063812 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (Security Hotpatch Update) |
Moderate | Denial of Service | 5063880 5063812 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Moderate | Denial of Service | 5063899 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Moderate | Denial of Service | 5063878 5064010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Moderate | Denial of Service | 5063878 5064010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59502 | Or Yair with SafeBreach |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-48813
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Virtual Secure Mode Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.3/TemporalScore:5.5
Executive Summary: Use of a key past its expiration date in Virtual Secure Mode allows an authorized attacker to perform spoofing locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-48813 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Spoofing | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Spoofing | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Spoofing | 5065432 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Spoofing | 5065432 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Spoofing | 5065425 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-48813 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-25004
MITRE NVD Issuing CNA: Microsoft |
CVE Title: PowerShell Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could create, modify, or delete files in the security context of the "NT AUTHORITY\SYSTEM" account. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authenticated attacker could place a malicious file in a specified custom module path and then wait for a user to run a privileged .NET application that starts a PowerShell session under Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-25004 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
PowerShell 7.4 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
7.4.13 |
Maybe | None | |
PowerShell 7.5 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
7.5.4 |
Maybe | None | |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-25004 | Casper tsuki tsuki |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53717
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Reliance on untrusted inputs in a security decision in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally. FAQ: What privileges would an attacker gain by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could potentially leak data from the target enclave or execute code within the context of the target enclave. Are there any additional steps that I need to follow to be protected from this vulnerability? The changes to address this vulnerability updated Virtual Secure Mode components. The policy described in Guidance for blocking rollback of Virtualization-based Security (VBS) related security updates has been updated to account for the latest changes. If you deployed this policy, then you'll need to redeploy using the updated policy. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53717 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53717 | Microsoft Offensive Research & Security Engineering |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50152
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Out-of-bounds read in Windows Kernel allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50152 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50152 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53150
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Digital Media Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could elevate from a low integrity level up to a medium integrity level. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53150 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53150 | Jongseong Kim (nevul37) with Ajou University, and working at ENKI WhiteHat Dongjun Kim (smlijun) with Ajou University, and working at ENKI WhiteHat Seongheun Hong (seongheunh) with Ajou University |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-50175
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Digital Media Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could elevate from a low integrity level up to a medium integrity level. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-50175 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-50175 | vipinkumar |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53139
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hello Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.7/TemporalScore:6.7
Executive Summary: Cleartext transmission of sensitive information in Windows Hello allows an unauthorized attacker to bypass a security feature locally. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass the Windows Hello Facial and Fingerprint Recognition security feature. Where can I find more information about Windows Hello Face Authentication? Please see Windows Hello Face Authentication and/or Windows Hello Fingerprint Authentication for updated details. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53139 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53139 | Parag Mali with Microsoft Parag Mali with Microsoft Ceri Coburn with NetSPI |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53768
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Xbox IStorageService Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Xbox allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53768 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53768 | R4nger with CyberKunLun & Zhiniang Peng with HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55240
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Visual Studio Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authenticated attacker could place a malicious file on the path to the project directory and then wait for a user with admin privileges to create a Visual Studio project to gain elevated privileges. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55240 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.9.77 |
Maybe | None | |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.52 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.10 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.20 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.12 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.12.13 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.14 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.14.17 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-55240 | Polar Penguin ycdxsb |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55248
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.8/TemporalScore:4.2
Executive Summary: Inadequate encryption strength in .NET, .NET Framework, Visual Studio allows an authorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Personally Identifiable Information (PII). According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with read/write privileges must send a victim a malicious email, or share the link to a malicious email, and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55248 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 8.0 installed on Linux | 5068331 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
8.0.21 |
Maybe | None | |
.NET 8.0 installed on Mac OS | 5068331 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
8.0.21 |
Maybe | None | |
.NET 8.0 installed on Windows | 5068331 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
8.0.21 |
Maybe | None | |
.NET 9.0 installed on Linux | 5068332 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
9.0.10 |
Maybe | None | |
.NET 9.0 installed on Mac OS | 5068332 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
9.0.10 |
Maybe | None | |
.NET 9.0 installed on Windows | 5068332 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
9.0.10 |
Maybe | None | |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066742 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
2.0.50727.8981 |
Maybe | None | |
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5066742 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
2.0.50727.8981 |
Maybe | None | |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066742 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
2.0.50727.8981 |
Maybe | None | |
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5066742 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
2.0.50727.8981 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5066738 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.7.04137.03 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5066738 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.7.04137.03 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5066738 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.7.04137.03 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5066738 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.7.04137.03 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5066738 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.02 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5066738 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.02 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5066746 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.04 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5066746 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.04 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5066746 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.04 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5066747 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.04 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5066747 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.04 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5066747 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.04 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5066738 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.02 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5066738 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.02 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5066743 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.04 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5066743 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.04 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5066746 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09320.02 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5066746 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09320.02 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5066746 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09320.02 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5066747 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09320.02 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5066747 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09320.02 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5066747 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09320.02 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5066133 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09321.01 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5066133 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09321.01 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 23H2 for ARM64-based Systems | 5066133 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09321.01 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 23H2 for x64-based Systems | 5066133 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09321.01 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 24H2 for ARM64-based Systems | 5066131 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09321.01 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 24H2 for x64-based Systems | 5066131 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09321.01 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 25H2 for ARM64-based Systems | 5066128 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09321.01 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 25H2 for x64-based Systems | 5066128 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09321.01 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5066743 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09320.02 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5066743 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09320.02 |
Maybe | None | |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022, 23H2 Edition (Server Core installation) | 5066129 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.1.09321.01 |
Maybe | None | |
Microsoft .NET Framework 3.5 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066742 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
2.0.50727.8981 |
Maybe | None | |
Microsoft .NET Framework 3.5 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5066742 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
2.0.50727.8981 |
Maybe | None | |
Microsoft .NET Framework 3.5 on Windows Server 2012 | 5066740 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
2.0.50727.8981 |
Maybe | None | |
Microsoft .NET Framework 3.5 on Windows Server 2012 (Server Core installation) | 5066740 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
2.0.50727.8981 |
Maybe | None | |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 | 5066741 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
2.0.50727.8981 |
Maybe | None | |
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 (Server Core installation) | 5066741 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
2.0.50727.8981 |
Maybe | None | |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066739 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
2.0.50727.8981 |
Maybe | None | |
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066739 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
2.0.50727.8981 |
Maybe | None | |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066742 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.7.04137.03 |
Maybe | None | |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066742 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.7.04137.03 |
Maybe | None | |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5066742 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.7.04137.03 |
Maybe | None | |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066742 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.7.04137.03 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066742 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.7.04137.03 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066742 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.7.04137.03 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 | 5066740 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.7.04137.06 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) | 5066740 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.7.04137.06 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 | 5066741 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.7.04137.03 |
Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) | 5066741 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.7.04137.03 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems | 5066136 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.02 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems | 5066136 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.02 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066739 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.02 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066739 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.02 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2012 | 5066740 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.04 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) | 5066740 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.04 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 | 5066741 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.04 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) | 5066741 (Monthly Rollup) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.04 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2016 | 5066136 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.02 |
Maybe | None | |
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) | 5066136 (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
4.8.04798.02 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.10 | Release Notes (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
17.10.20 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.12 | Release Notes (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
17.12.13 |
Maybe | None | |
Microsoft Visual Studio 2022 version 17.14 | Release Notes (Security Update) | Important | Information Disclosure | Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
17.14.17 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-55248 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55326
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Use after free in Connected Devices Platform Service (Cdpsvc) allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. How could an attacker exploit this vulnerability? To exploit this vulnerability, a remote unauthenticated attacker would need to send specially crafted traffic to a system with the "Nearby Sharing" feature enabled and to convince a user to take specific actions. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? In a web-based attack scenario, an attacker could host a website or server that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55326 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Remote Code Execution | 5065425 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55326 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55328
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55328 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55328 | hazard |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55330
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows BitLocker Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Executive Summary: Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55330 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Security Feature Bypass | 5065425 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55330 | Alon Leviev with Microsoft (STORM) Alon Leviev with Microsoft (STORM) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55331
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55331 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55331 | Taewoo (Tae_ω02) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55332
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows BitLocker Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Executive Summary: Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55332 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Security Feature Bypass | 5065432 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Security Feature Bypass | 5065432 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Security Feature Bypass | 5065425 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55332 | Alon Leviev with Microsoft (STORM) Alon Leviev with Microsoft (STORM) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55334
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.2/TemporalScore:5.4
Executive Summary: Cleartext storage of sensitive information in Windows Kernel allows an unauthorized attacker to bypass a security feature locally. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could decrypt the driver's settings. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55334 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55334 | Microsoft Offensive Research & Security Engineering |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55337
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows BitLocker Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Executive Summary: Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55337 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55337 | Alon Leviev with Microsoft (STORM) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55678
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55678 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55678 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55679
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.1/TemporalScore:4.5
Executive Summary: Improper input validation in Windows Kernel allows an unauthorized attacker to disclose information locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55679 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55679 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55680
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Time-of-check time-of-use (toctou) race condition in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55680 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55680 | TyphoonPWN Windows PE Winner with SSD Secure Disclosure |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55682
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows BitLocker Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Executive Summary: Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55682 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55682 | Alon Leviev with Microsoft (STORM) Alon Leviev with Microsoft (STORM) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55683
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55683 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55683 | Lewis Lee |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55684
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55684 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55684 | Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat Hwiwon Lee (hwiwonl), SEC-agent team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55688
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55688 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55688 | Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat Hwiwon Lee (hwiwonl), SEC-agent team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55690
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55690 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55690 | Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat Hwiwon Lee (hwiwonl), SEC-agent team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55691
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55691 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55691 | Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat Hwiwon Lee (hwiwonl), SEC-agent team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55692
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Error Reporting Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper input validation in Windows Error Reporting allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55692 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55692 | Denis Faiustov with GMO Cybersecurity by Ierae Ruslan Sayfiev with GMO Cybersecurity by Ierae |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55693
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Executive Summary: Use after free in Windows Kernel allows an unauthorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-free vulnerability, even as a standard user. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55693 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55693 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55694
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Error Reporting Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper access control in Windows Error Reporting allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55694 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55694 | Denis Faiustov and Ruslan Sayfiev with GMO Cybersecurity by Ierae |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55695
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows WLAN AutoConfig Service Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55695 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Information Disclosure | 5065508 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Information Disclosure | 5065508 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Information Disclosure | 5065508 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Information Disclosure | 5065508 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Information Disclosure | 5065468 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Information Disclosure | 5065468 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Information Disclosure | 5065509 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Information Disclosure | 5065509 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Information Disclosure | 5065507 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Information Disclosure | 5065507 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55695 | RuiLun Zou with Codesafe Team of Legendsec at Qi'anxin Group |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55696
MITRE NVD Issuing CNA: Microsoft |
CVE Title: NtQueryInformation Token function (ntifs.h) Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Time-of-check time-of-use (toctou) race condition in NtQueryInformation Token function (ntifs.h) allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55696 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55696 | Microsoft Offensive Research & Security Engineering Microsoft Offensive Research & Security Engineering |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55697
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Local Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Azure Local allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55697 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55697 | Microsoft Offensive Research & Security Engineering (MORSE) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55698
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DirectX Graphics Kernel Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.7/TemporalScore:6.7
Executive Summary: Null pointer dereference in Windows DirectX allows an authorized attacker to deny service over a network. FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to cause denial of service on the Hyper-V host environment. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55698 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 7.7 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55698 | cyanbamboo |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55699
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55699 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55699 | Maxime Villard |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58714
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58714 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58714 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58718
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Remote Desktop Client Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network. FAQ: How would an attacker exploit this vulnerability? An attacker would have to convince a targeted user to connect to a malicious RDP server. Upon connecting, the malicious server could execute code on the victim's system in the context of the targeted user. Mitigations: Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation: Port redirection must be enabled for this attack to be successful. This feature is disabled by default. Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58718 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Remote Desktop client for Windows Desktop | Release Notes (Security Update) | Important | Remote Code Execution | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.2.6599.0 |
Maybe | None | |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows App Client for Windows Desktop | Release Notes (Security Update) | Important | Remote Code Execution | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
2.0.706.0 |
Maybe | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065468 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065468 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Remote Code Execution | 5065509 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Remote Code Execution | 5065509 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Remote Code Execution | 5065425 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58718 | YingQi Shi (@Mas0n) with DBAPPSecurity WeBin Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58720
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Cryptographic Services Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is secrets or privileged information belonging to the user of the affected application. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58720 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58720 | Mitch Lindgren with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58724
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58724 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Arc Enabled Servers - Azure Connected Machine Agent | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.56 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-58724 | Sharan Patil with REVERSEC |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58725
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows COM+ Event System Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Heap-based buffer overflow in Windows COM allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58725 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58725 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58726
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows SMB Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network. FAQ: How could an attacker exploit the vulnerability? To exploit this vulnerability, an attacker could execute a specially crafted script to coerce the victim machine to connect back to the attacker’s SMB Server using SMB and authenticate. This could result in elevation of privilege. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? The Attack requires an SPN that is registered to an account that no longer exists or is not in use, to be on the target machine Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58726 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58726 | Andrea Pierini with Semperis |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58727
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58727 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58727 | Zhang WangJunJie, He YiSheng with Hillstone Networks Security Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58729
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Local Session Manager (LSM) Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58729 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Denial of Service | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Denial of Service | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Denial of Service | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Denial of Service | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Denial of Service | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Denial of Service | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Denial of Service | 5065468 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Denial of Service | 5065468 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Denial of Service | 5065509 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Denial of Service | 5065509 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Denial of Service | 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Denial of Service | 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Denial of Service | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Denial of Service | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Denial of Service | 5065425 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58729 | Philemon Orphee Favrod |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58730
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58730 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Remote Code Execution | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Remote Code Execution | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Remote Code Execution | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58730 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58731
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58731 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022 | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Remote Code Execution | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58731 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58733
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58733 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Remote Code Execution | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Remote Code Execution | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Remote Code Execution | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58733 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58734
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58734 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Remote Code Execution | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58734 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58736
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58736 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Remote Code Execution | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Remote Code Execution | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Remote Code Execution | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Remote Code Execution | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Remote Code Execution | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58736 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58737
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Remote Desktop Protocol Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58737 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Remote Code Execution | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Remote Code Execution | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Remote Code Execution | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58737 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58738
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58738 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Remote Code Execution | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Remote Code Execution | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Remote Code Execution | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Remote Code Execution | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Remote Code Execution | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Remote Code Execution | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Remote Code Execution | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58738 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-58739
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Windows File Explorer Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Successful exploitation of this vulnerability requires the user to view a specially crafted file in the Windows File Explorer Preview Pane. The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2? While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms. To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-58739 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Spoofing | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Spoofing | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Spoofing | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Spoofing | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) 5066840 (IE Cumulative) |
Important | Spoofing | 5065508 5065435 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 1.000 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) 5066840 (IE Cumulative) |
Important | Spoofing | 5065508 5065435 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 1.000 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) 5066840 (IE Cumulative) |
Important | Spoofing | 5065508 5065435 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 1.000 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) 5066840 (IE Cumulative) |
Important | Spoofing | 5065508 5065435 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 1.000 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066840 (IE Cumulative) 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Spoofing | 5065435 5065468 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066840 (IE Cumulative) 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Spoofing | 5065435 5065468 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066840 (IE Cumulative) 5066875 (Monthly Rollup) |
Important | Spoofing | 5065435 5065509 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066840 (IE Cumulative) 5066875 (Monthly Rollup) |
Important | Spoofing | 5065435 5065509 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066840 (IE Cumulative) 5066873 (Monthly Rollup) |
Important | Spoofing | 5065435 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066840 (IE Cumulative) 5066873 (Monthly Rollup) |
Important | Spoofing | 5065435 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Spoofing | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Spoofing | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Spoofing | 5065425 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-58739 | 01dGu0@whitecap100 Nacl Novy@whitecap100 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59184
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Storage Spaces Direct Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows High Availability Services allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59184 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59184 | Lewis Lee |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59187
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper input validation in Windows Kernel allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59187 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59187 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59188
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Failover Cluster Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows Failover Cluster allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59188 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Information Disclosure | 5065509 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Information Disclosure | 5065509 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Information Disclosure | 5065507 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Information Disclosure | 5065507 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59188 | Lewis Lee, Chunyang Han and Zhiniang Peng with HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59189
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Executive Summary: Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to have a deep understanding of the system. Successful exploitation is not guaranteed and depends on a combination of factors that might include the environment, system configuration, and the presence of additional security measures. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59189 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59189 | hazard |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59190
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Search Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Improper input validation in Microsoft Windows Search Component allows an unauthorized attacker to deny service locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to access a malicious folder or directory. Users should never open anything that they do not know or trust to be safe. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59190 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Denial of Service | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Denial of Service | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Denial of Service | 5065508 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Denial of Service | 5065508 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Denial of Service | 5065508 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Denial of Service | 5065508 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Denial of Service | 5065468 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Denial of Service | 5065468 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Denial of Service | 5065509 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Denial of Service | 5065509 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Denial of Service | 5065507 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Denial of Service | 5065507 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Denial of Service | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Denial of Service | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Denial of Service | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59190 | Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat Hwiwon Lee (hwiwonl), SEC-agent team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59191
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59191 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59191 | Zhang WangJunJie, He YiSheng with Hillstone Networks Security Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59192
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Storport.sys Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Buffer over-read in Storport.sys Driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59192 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59192 | zoemurmure with Qingteng |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59193
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Management Services Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59193 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59193 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59194
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use of uninitialized resource in Windows Kernel allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-free vulnerability, even as a standard user. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59194 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59194 | Muhammad Faathin Abdurrahman |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59197
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows ETL Channel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Insertion of sensitive information into log file in Windows ETL Channel allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the local memory address Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59197 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59197 | Aobo Wang |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59198
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Search Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.0/TemporalScore:4.4
Executive Summary: Improper input validation in Microsoft Windows Search Component allows an authorized attacker to deny service locally. FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability? The vulnerability can be exploited by a regular user without admin rights, as long as they interact with a malicious file—such as running an executable. No elevated privileges are needed to trigger the issue. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59198 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Denial of Service | 5065430 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Denial of Service | 5065430 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Denial of Service | 5065508 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Denial of Service | 5065508 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Denial of Service | 5065508 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Denial of Service | 5065508 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Denial of Service | 5065468 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Denial of Service | 5065468 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Denial of Service | 5065509 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Denial of Service | 5065509 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Denial of Service | 5065507 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Denial of Service | 5065507 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Denial of Service | 5065432 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Denial of Service | 5065432 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Denial of Service | 5065425 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59198 | Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59203
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows State Repository API Server File Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Insertion of sensitive information into log file in Windows StateRepository API allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the local memory address Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59203 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59203 | Aobo Wang |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59205
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Graphics Component Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59205 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59205 | wenqunwang with China Telecom Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59208
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows MapUrlToZone Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network. FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to a high loss of confidentiality (C:H), and some loss of integrity (I:L) and no loss of availability (A:N). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could view sensitive information, (Confidentiality), and make some changes to disclosed information (Integrity), but they would not be able to affect Availability. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2? While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms. To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59208 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) 5066840 (IE Cumulative) |
Important | Information Disclosure | 5065508 5065435 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 1.000 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) 5066840 (IE Cumulative) |
Important | Information Disclosure | 5065508 5065435 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 1.000 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) 5066840 (IE Cumulative) |
Important | Information Disclosure | 5065508 5065435 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 1.000 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) 5066840 (IE Cumulative) |
Important | Information Disclosure | 5065508 5065435 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 1.000 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066840 (IE Cumulative) 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Information Disclosure | 5065435 5065468 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
1.000 6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066840 (IE Cumulative) 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Information Disclosure | 5065435 5065468 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
1.000 6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066840 (IE Cumulative) 5066875 (Monthly Rollup) |
Important | Information Disclosure | 5065435 5065509 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
1.000 6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066840 (IE Cumulative) 5066875 (Monthly Rollup) |
Important | Information Disclosure | 5065435 5065509 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
1.000 6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066840 (IE Cumulative) 5066873 (Monthly Rollup) |
Important | Information Disclosure | 5065435 5065507 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
1.000 6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066840 (IE Cumulative) 5066873 (Monthly Rollup) |
Important | Information Disclosure | 5065435 5065507 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
1.000 6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59208 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59209
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Push Notification Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory addresses belonging to the "EventLog" Windows service Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59209 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Information Disclosure | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Information Disclosure | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Information Disclosure | 5065509 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Information Disclosure | 5065509 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Information Disclosure | 5065507 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Information Disclosure | 5065507 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59209 | Aobo Wang |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59210
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59210 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59210 | Hwiwon Lee (hwiwonl), SEC-agent team Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59213
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Configuration Manager Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Executive Summary: Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an unauthorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An authorized attacker who successfully exploited this vulnerability could gain configuration manager administrator privileges. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by injecting malicious SQL into the DuplicateAMTMachineRecord method. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59213 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Configuration Manager 2403 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
5.00.9128.1035 |
Maybe | None | |
Microsoft Configuration Manager 2409 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
5.00.9132.1029 |
Maybe | None | |
Microsoft Configuration Manager 2503 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
5.00.9135.1008 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59213 | Mehdi Elyassa with Synacktiv |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59214
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Windows File Explorer Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user would need to be tricked into opening a folder that contains a specially crafted file. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59214 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Spoofing | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Spoofing | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Spoofing | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Spoofing | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Spoofing | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Spoofing | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Spoofing | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Spoofing | 5065508 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Spoofing | 5065468 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Spoofing | 5065468 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Spoofing | 5065509 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Spoofing | 5065509 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Spoofing | 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Spoofing | 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Spoofing | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Spoofing | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Spoofing | 5065425 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59214 | Hemant Kumar Ruben Enkaoua Holl0w & https://www.linkedin.com/in/bartlomiejadamski/ |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59221
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. FAQ: There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59221 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft SharePoint Enterprise Server 2016 | 5002788 (Security Update) 5002787 (Security Update) |
Important | Remote Code Execution | 5002778 5002777 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002796 (Security Update) 5002798 (Security Update) |
Important | Remote Code Execution | 5002775 5002774 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20059 |
Maybe | None |
Microsoft Word 2016 (32-bit edition) | 5002789 (Security Update) | Important | Remote Code Execution | 5002780 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Word 2016 (64-bit edition) | 5002789 (Security Update) | Important | Remote Code Execution | 5002780 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59221 | Haifei Li with EXPMON |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59222
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. FAQ: There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59222 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft SharePoint Enterprise Server 2016 | 5002788 (Security Update) 5002787 (Security Update) |
Important | Remote Code Execution | 5002778 5002777 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002796 (Security Update) 5002798 (Security Update) |
Important | Remote Code Execution | 5002775 5002774 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20059 |
Maybe | None |
Microsoft Word 2016 (32-bit edition) | 5002789 (Security Update) | Important | Remote Code Execution | 5002780 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Word 2016 (64-bit edition) | 5002789 (Security Update) | Important | Remote Code Execution | 5002780 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59222 | Haifei Li with EXPMON |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59223
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59223 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002794 (Security Update) | Important | Remote Code Execution | 5002782 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002794 (Security Update) | Important | Remote Code Execution | 5002782 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Office Online Server | 5002797 (Security Update) | Important | Remote Code Execution | 5002776 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20059 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59223 | 0x140ce |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59224
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59224 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002794 (Security Update) | Important | Remote Code Execution | 5002782 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002794 (Security Update) | Important | Remote Code Execution | 5002782 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Office Online Server | 5002797 (Security Update) | Important | Remote Code Execution | 5002776 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20059 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59224 | Anonymous Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59225
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59225 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002794 (Security Update) | Important | Remote Code Execution | 5002782 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002794 (Security Update) | Important | Remote Code Execution | 5002782 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Office Online Server | 5002797 (Security Update) | Important | Remote Code Execution | 5002776 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20059 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59225 | Quan Jin with DBAPPSecurity WeBin Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59226
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user would need to be tricked into opening a malicious file in Visio. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59226 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None |
CVE ID | Acknowledgements |
CVE-2025-59226 | 4n0nym4u5 with Zscaler |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59227
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59227 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002792 (Security Update) | Critical | Remote Code Execution | 5002781 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002792 (Security Update) | Critical | Remote Code Execution | 5002781 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office for Android | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.19328.20000 |
Maybe | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59227 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59229
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Uncaught exception in Microsoft Office allows an unauthorized attacker to deny service locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59229 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Denial of Service | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Denial of Service | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Denial of Service | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Denial of Service | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None |
CVE ID | Acknowledgements |
CVE-2025-59229 | mose nilsson moushi |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59232
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59232 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Access 2016 (32-bit edition) | 5002720 (Security Update) | Important | Information Disclosure | 5002701 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Access 2016 (64-bit edition) | 5002720 (Security Update) | Important | Information Disclosure | 5002701 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Excel 2016 (32-bit edition) | 5002794 (Security Update) 5002719 (Security Update) 5002757 (Security Update) 5002341 (Security Update) |
Important | Information Disclosure | 5002782 5002588 5002734 5002052 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002794 (Security Update) 5002719 (Security Update) 5002757 (Security Update) 5002341 (Security Update) |
Important | Information Disclosure | 5002782 5002588 5002734 5002052 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft Office LTSC for Mac 2024 | Release Notes (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.102.25101223 |
Maybe | None | |
Microsoft SharePoint Enterprise Server 2016 | 5002788 (Security Update) | Important | Information Disclosure | 5002778 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002796 (Security Update) | Important | Information Disclosure | 5002775 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.10417.20059 |
Maybe | None |
Office Online Server | 5002797 (Security Update) | Important | Information Disclosure | 5002776 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.10417.20059 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59232 | Nathan Shomber of Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59238
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft PowerPoint Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59238 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft PowerPoint 2016 (32-bit edition) | 5002790 (Security Update) | Important | Remote Code Execution | 5002779 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
Microsoft PowerPoint 2016 (64-bit edition) | 5002790 (Security Update) | Important | Remote Code Execution | 5002779 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5522.1000 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59238 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59241
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Health and Optimized Experiences Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper link resolution before file access ('link following') in Windows Health and Optimized Experiences Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59241 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59241 | Filip Dragović |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-2884
MITRE NVD Issuing CNA: CERT/CC |
CVE Title: Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation
CVSS: CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.6
Executive Summary: CVE-2025-2884 is regarding a vulnerability in CG TPM2.0 Reference implementation's CryptHmacSign helper function that is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. CERT/CC created this CVE on their behalf. The documented Windows updates incorporate updates in CG TPM2.0 Reference implementation which address this vulnerability. Please see CVE-2025-2884 for more information. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-2884 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Information Disclosure | 5065431 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Information Disclosure | Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.3 Temporal: 4.6 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-2884 | Anonymous Anonymous TCG [security@trustedcomputing.org] TCG |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59244
MITRE NVD Issuing CNA: Microsoft |
CVE Title: NTLM Hash Disclosure Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user interacting with the file in multiple ways will cause the NTLM hash to be leaked. A few interactions which trigger this leak include:
Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59244 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Spoofing | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Spoofing | 5065430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Spoofing | 5065429 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Spoofing | 5065431 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Spoofing | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Spoofing | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Spoofing | 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Spoofing | 5065507 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Spoofing | 5065427 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Spoofing | 5065428 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Spoofing | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Spoofing | 5065432 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Spoofing | 5065425 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Spoofing | 5065426 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59244 | Nacl |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59248
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Exchange Server Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Improper input validation in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59248 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Exchange Server 2016 Cumulative Update 23 | 5066369 (Security Update) | Important | Spoofing | 5063223 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.01.2507.061 |
Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 14 | 5066368 (Security Update) | Important | Spoofing | 5063222 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.02.1544.036 |
Yes | None |
Microsoft Exchange Server 2019 Cumulative Update 15 | 5066367 (Security Update) | Important | Spoofing | 5063221 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.02.1748.039 |
Yes | None |
Microsoft Exchange Server Subscription Edition RTM | 5066366 (Security Update) | Important | Spoofing | 5063224 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.02.2562.029 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59248 | Anna Breeva with Breeva-X |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59230
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Executive Summary: Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2025-59230 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59230 | Microsoft Threat Intelligence Center (MSTIC) & Microsoft Security Response Center (MSRC) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59253
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Search Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59253 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Denial of Service | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Denial of Service | 5065430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Denial of Service | 5065429 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Denial of Service | 5065431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Denial of Service | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Denial of Service | 5065509 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Denial of Service | 5065509 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Denial of Service | 5065507 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Denial of Service | 5065507 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Denial of Service | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Denial of Service | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Denial of Service | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Denial of Service | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Denial of Service | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Denial of Service | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59253 | Remco van der Meer with Warpnet |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59260
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Failover Cluster Virtual Driver Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Exposure of sensitive information to an unauthorized actor in Microsoft Failover Cluster Virtual Driver allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59260 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2016 | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Information Disclosure | 5065427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Information Disclosure | 5065428 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Information Disclosure | 5065432 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Information Disclosure | 5065425 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Information Disclosure | 5065426 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59260 | Lewis Lee, Chunyang Han and Zhiniang Peng with HUST Chunyang Han Lewis Lee, Chunyang Han and Zhiniang Peng with HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59261
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Graphics Component Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Time-of-check time-of-use (toctou) race condition in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59261 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59261 | Maxime Villard |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59275
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Authentication Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59275 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59275 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59278
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Authentication Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally. FAQ: How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59278 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Elevation of Privilege | 5065430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Elevation of Privilege | 5065429 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Elevation of Privilege | 5065431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5066874 (Monthly Rollup) 5066877 (Security Only) |
Important | Elevation of Privilege | 5065508 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23571 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5066872 (Monthly Rollup) 5066876 (Security Only) |
Important | Elevation of Privilege | 5065468 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27974 |
Yes | None |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Elevation of Privilege | 5065509 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Elevation of Privilege | 5065507 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Elevation of Privilege | 5065427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Elevation of Privilege | 5065428 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Elevation of Privilege | 5065432 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Elevation of Privilege | 5065425 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Elevation of Privilege | 5065426 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59278 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-11215
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-11215 Off by one error in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11215 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
141.0.3537.57 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-11215 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-11216
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-11216 Inappropriate implementation in Storage
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11216 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
141.0.3537.57 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-11216 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-11213
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-11213 Inappropriate implementation in Omnibox
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11213 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
141.0.3537.57 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-11213 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-11210
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-11210 Side-channel information leakage in Tab
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11210 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
141.0.3537.57 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-11210 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-11207
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-11207 Side-channel information leakage in Storage
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11207 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
141.0.3537.57 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-11207 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-11208
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-11208 Inappropriate implementation in Media
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11208 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
141.0.3537.57 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-11208 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-11206
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-11206 Heap buffer overflow in Video
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11206 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
141.0.3537.57 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-11206 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-11219
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-11219 Use after free in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11219 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
141.0.3537.57 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-11219 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59285
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Monitor Agent Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L) and the privilege required is none (PR:L). What privileges could an attacker gain with successful exploitation? A local user could take advantage of this vulnerability and perform elevation of privilege (EOP). By successfully exploiting this vulnerability, the attacker could elevate their privileges to obtain root level access on the virtual machine. According to the CVSS metric, the attack complexity is high (AC:H). What is does this mean in the context of the elevation of privilege vulnerability? In order to successfully exploit this vulnerability, the attacker requires write access to the configuration directory by creating malicious files in a directory before the Azure Monitor Agent is installed or before the service starts after system restart. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59285 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Monitor Agent | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.36.3 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59285 | P1hcn |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-59489
MITRE NVD Issuing CNA: MITRE |
CVE Title: MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:8.4
Executive Summary: Unity announced a security vulnerability (CVE-2025-59489) that is affecting games or applications built with the Unity Gaming Engine Editor (version 2017.1 or later). You may be using a Microsoft app or playing a Microsoft game that should be uninstalled until an update is available. We are working to update games and applications that are potentially affected by this Unity vulnerability. In most cases, you can stay safe by ensuring your games and applications are up to date and Microsoft Defender is running on your device. If you have downloaded a vulnerable game or app (see list below) on one of the following platforms, you could be at risk:
We have confirmed the following are not impacted:
Recommended Next Steps: For Developers: Unity has made a fix available to developers. Organizations who believe that they have an app or game that might be impacted should reference Unity guidance and update their apps/games as soon as possible. You can learn more from Unity here. For Players and Customers: Microsoft security and game development teams are working to update any game or application that is potentially affected by this Unity vulnerability. If a Microsoft-owned game or application is not listed and you have installed all available updates, no further action is required. For customers who have automatic updates enabled, fixes will be deployed as they become available. If you have automatic updates turned off, please check to see if you have any updates available for your downloaded apps and games and install the latest update on your device. Customers who have an impacted app or game installed (see below list) are encouraged to take these steps:
For Microsoft Mesh Apps Users In response to this CVE that is affecting applications built with the Unity Gaming Engine Editor (version 2017.1 or later), Microsoft has released a required security update for the Microsoft Mesh PC applications. We strongly encourage all users with the Microsoft Mesh apps installed on their devices to promptly update to the latest version of these apps, version 5.2513.3.0 or greater. If you have automatic updates enabled for these apps on all devices, no further action is required. While we do not expect this to affect the functionality of any previously-scheduled events in Microsoft Mesh, use of the immersive spaces in Microsoft Teams meetings, or immersive events in Microsoft Teams, users will be required to update the Mesh PC apps before joining newly scheduled events in Mesh. We are informing you of this now so that you can mitigate any disruptions this may introduce to your events. FAQ: Why are there no links to updates in the Security Updates Table? This document will be updated with more information as it becomes available. We recommend allowing automatic updates for the apps on your platform. I am using an impacted game or app, what should I do? You should uninstall the impacted application until an update is available. Updates are being released regularly, you can check this page to see if the impacted application has been removed from the “Updates in Progress” list above or check for available updates on your device. We also encourage customers to subscribe to Security Update Guide notifications to be alerted of updates for impacted games/apps. This Advisory and the related CVE will be updated with new information as needed and will link to any future security updates released. How do I check for and install updates for my games or apps? Windows customers can learn more here. If you are using another platform, please refer to their guidance. How do I uninstall an impacted game or application? To uninstall an app or game on Windows, press the Windows logo key on your keyboard or toolbar, and then enter settings in the search bar. Select Settings from the results, and then go to Apps > Apps & features or Installed apps, depending on your version of Windows. If you're on a Windows 10 device, choose the game that you want to uninstall from the list and then select Uninstall two times. On Windows 11, select the More actions button (“…”), and then select Uninstall two times. If you're on a Windows 10 device, choose the game that you want to uninstall from the list and then select Uninstall two times. On Windows 11, select the More actions button (“…”), and then select Uninstall two times. How do I know if my game is impacted? You can review the above list for impacted Microsoft titles. If the game you are playing is not listed and you have installed all available security updates, no further action is required. The above list is only representative of first-party Microsoft games. I am playing one of the impacted games on Xbox console, should I be worried? No. Console games and cloud gaming are not impacted. Are there any games that were vulnerable but Microsoft has already released security updates for? Yes, our teams have already released updates for some games and applications that were built on the effected version of Unity Editor. Those games and apps will be listed in the soon-to-be-published CVE-2025-59489. When will updates be available for the games and apps that have not been updated? Microsoft does not provide ETAs for security updates. Solutions to security issues are tested to ensure quality prior to release and will be published to the Microsoft Store once validation has been completed. Are there any mitigations that can be deployed until a patch is available? The game or app can be uninstalled and reinstalled once a patched version is available, please see MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability for the current status. Additionally, Windows Defender will block exploitation attempts, Defender definitions version 1.437.296.0 and above have the following detections:
Are handheld devices affected? Devices running Windows are affected, including desktops, laptops and handheld devices. Mitigations: None Workarounds: None Revision: 1.0    03-Oct-25     Information published. 2.0    07-Oct-25     The following updates have been made to CVE-2025-59489: 1) In the Security Updates table, added Microsoft Mesh and Microsoft Mesh for Meta Quest as they affected by this vulnerability. 2) Further, to comprehensively address this vulnerability, Microsoft has released the 5.2514 build for these applications. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59489 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Avowed Artbook | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
DOOM (2019) | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
DOOM II (2019) | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
DOOM: Dark Ages Companion App | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Fallout Shelter | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Forza Customs | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Gears POP! | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Ghostwide Tokyo Prelude | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Grounded 2 Artbook | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Halo Recruit | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Hearthstone | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Knights and Bikes | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Microsoft Mesh for Meta Quest | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
5.2514 |
Maybe | None | |
Microsoft Mesh PC Applications | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
5.2514 |
Maybe | None | |
Mighty Doom | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Pillars of Eternity | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Pillars of Eternity II: Deadfire | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Pillars of Eternity II: Deadfire - Ultimate Edition | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Pillars of Eternity: Definitive Edition | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Pillars of Eternity: Hero Edition | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Starfield Companion App | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
The Bard's Tale Trilogy | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
The Elder Scrolls IV: Oblivion Remastered Companion App | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
The Elder Scrolls: Blades | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
The Elder Scrolls: Castles | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
The Elder Scrolls: Legends | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Warcraft Rumble | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Wasteland 3 | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Wasteland Remastered | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Zoo Tycoon Friends | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-59489 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59287
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network. FAQ: How could an attacker exploit this vulnerability? A remote, unauthenticated attacker could send a crafted event that triggers unsafe object deserialization in a legacy serialization mechanism, resulting in remote code execution. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59287 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 | 5066875 (Monthly Rollup) | Critical | Remote Code Execution | 5065509 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Critical | Remote Code Execution | 5065509 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Critical | Remote Code Execution | 5065507 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Critical | Remote Code Execution | 5065507 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Critical | Remote Code Execution | 5065427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Critical | Remote Code Execution | 5065427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Critical | Remote Code Execution | 5065428 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Critical | Remote Code Execution | 5065428 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Critical | Remote Code Execution | 5065432 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Critical | Remote Code Execution | 5065432 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Critical | Remote Code Execution | 5065425 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Critical | Remote Code Execution | 5065426 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Critical | Remote Code Execution | 5065426 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59287 | MEOW |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59289
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Bluetooth Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Double free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. This CVE was addressed by updates that were released in September 2025, but the CVE was inadvertently omitted from the September 2025 Security Updates. This is an informational change only. Customers who have already installed the September 2025 updates do not need to take any further action. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59289 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (Security Hotpatch Update) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-59289 | Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat Hwiwon Lee (hwiwonl), SEC-agent team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-47827
MITRE NVD Issuing CNA: MITRE |
CVE Title: MITRE CVE-2025-47827: Secure Boot bypass in IGEL OS before 11
CVSS: CVSS:3.1 Highest BaseScore:4.6/TemporalScore:4.3
Executive Summary: In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image. MITRE created this CVE on their behalf. The documented Windows updates incorporate updates in IGEL OS which address this vulnerability. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2025-47827 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5066837 (Security Update) | Important | Security Feature Bypass | 5065430 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 for x64-based Systems | 5066837 (Security Update) | Important | Security Feature Bypass | 5065430 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.10240.21161 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5066836 (Security Update) | Important | Security Feature Bypass | 5065427 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5066836 (Security Update) | Important | Security Feature Bypass | 5065427 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.19044.6456 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5066791 (Security Update) | Important | Security Feature Bypass | 5065429 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.19045.6456 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.22621.6060 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5066793 (Security Update) | Important | Security Feature Bypass | 5065431 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.22631.6060 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows 11 Version 25H2 for ARM64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows 11 Version 25H2 for x64-based Systems | 5066835 (Security Update) | Important | Security Feature Bypass | Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.26200.6899 |
Yes | None | |
Windows Server 2012 | 5066875 (Monthly Rollup) | Important | Security Feature Bypass | 5065509 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5066875 (Monthly Rollup) | Important | Security Feature Bypass | 5065509 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
6.2.9200.25722 |
Yes | None |
Windows Server 2012 R2 | 5066873 (Monthly Rollup) | Important | Security Feature Bypass | 5065507 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5066873 (Monthly Rollup) | Important | Security Feature Bypass | 5065507 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
6.3.9600.22824 |
Yes | None |
Windows Server 2016 | 5066836 (Security Update) | Important | Security Feature Bypass | 5065427 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5066836 (Security Update) | Important | Security Feature Bypass | 5065427 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.14393.8519 |
Yes | None |
Windows Server 2019 | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5066586 (Security Update) | Important | Security Feature Bypass | 5065428 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.17763.7919 |
Yes | None |
Windows Server 2022 | 5066782 (Security Update) | Important | Security Feature Bypass | 5065432 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5066782 (Security Update) | Important | Security Feature Bypass | 5065432 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.20348.4294 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5066780 (Security Update) | Important | Security Feature Bypass | 5065425 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.25398.1913 |
Yes | None |
Windows Server 2025 | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5066835 (Security Update) | Important | Security Feature Bypass | 5065426 |
Base: 4.6 Temporal: 4.3 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C |
10.0.26100.6899 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-47827 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59497
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Defender for Linux Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Time-of-check time-of-use (toctou) race condition in Microsoft Defender for Linux allows an authorized attacker to deny service locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    14-Oct-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59497 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Defender for Endpoint for Linux | Release Notes (Security Update) | Important | Denial of Service | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
101.25032.0010 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-59497 | G1ND1L4 Gil Regev |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59218
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Entra ID Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.6/TemporalScore:8.3
Executive Summary: Azure Entra ID Elevation of Privilege Vulnerability FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    09-Oct-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59218 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Entra ID | Critical | Elevation of Privilege | None | Base: 9.6 Temporal: 8.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-59218 | Vladimir Abramzon Vladimir Abramzon |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59246
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Entra ID Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: Azure Entra ID Elevation of Privilege Vulnerability FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    09-Oct-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59246 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Entra ID | Critical | Elevation of Privilege | None | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-59246 | Dylan Ryan-Zilavy |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59247
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure PlayFab Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    09-Oct-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59247 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure PlayFab | Critical | Elevation of Privilege | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-59247 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59252
MITRE NVD Issuing CNA: Microsoft |
CVE Title: M365 Copilot Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    09-Oct-25     Information published. |
Critical | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59252 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Word Copilot | Critical | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-59252 | Estevam Arantes with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59271
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Redis Enterprise Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.7/TemporalScore:7.6
Executive Summary: None FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    09-Oct-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59271 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Cache for Redis Enterprise | Critical | Elevation of Privilege | None | Base: 8.7 Temporal: 7.6 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Azure Managed Redis | Critical | Elevation of Privilege | None | Base: 8.7 Temporal: 7.6 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-59271 | Chantal Olieman with Microsoft Gary Wang with Microsoft Jordan Rodak with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59272
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Copilot Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    09-Oct-25     Information published. |
Critical | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59272 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Copilot's Business Chat | Critical | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-59272 | Estevam Arantes with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55321
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Monitor Log Analytics Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.7/TemporalScore:7.6
Executive Summary: Improper neutralization of input during web page generation ('cross-site scripting') in Azure Monitor allows an authorized attacker to perform spoofing over a network. FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    09-Oct-25     Information published. |
Critical | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55321 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Monitor | Critical | Spoofing | None | Base: 8.7 Temporal: 7.6 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-55321 | Arnaud PASCAL with VAADATA Thomas DELFINO with VAADATA |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-59286
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Copilot Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    09-Oct-25     Information published. |
Critical | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-59286 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Copilot's Business Chat | Critical | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-59286 | Estevam Arantes with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39895
MITRE NVD Issuing CNA: Linux |
CVE Title: sched: Fix sched_numa_find_nth_cpu() if mask offline
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39895 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39895 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39934
MITRE NVD Issuing CNA: Linux |
CVE Title: drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39934 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39934 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39929
MITRE NVD Issuing CNA: Linux |
CVE Title: smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39929 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39929 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39938
MITRE NVD Issuing CNA: Linux |
CVE Title: ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39938 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39938 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39942
MITRE NVD Issuing CNA: Linux |
CVE Title: ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39942 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39942 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39946
MITRE NVD Issuing CNA: Linux |
CVE Title: tls: make sure to abort the stream if headers are bogus
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39946 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39946 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39943
MITRE NVD Issuing CNA: Linux |
CVE Title: ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Critical | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39943 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Critical | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39943 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39951
MITRE NVD Issuing CNA: Linux |
CVE Title: um: virtio_uml: Fix use-after-free after put_device in probe
CVSS: CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39951 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 6.1 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39951 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39937
MITRE NVD Issuing CNA: Linux |
CVE Title: net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39937 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39937 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39932
MITRE NVD Issuing CNA: Linux |
CVE Title: smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work)
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39932 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39932 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39949
MITRE NVD Issuing CNA: Linux |
CVE Title: qed: Don't collect too many protection override GRC elements
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39949 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39949 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39945
MITRE NVD Issuing CNA: Linux |
CVE Title: cnic: Fix use-after-free bugs in cnic_delete_task
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Important | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39945 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Important | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39945 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39933
MITRE NVD Issuing CNA: Linux |
CVE Title: smb: client: let recv_done verify data_offset, data_length and remaining_data_length
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39933 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39933 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39931
MITRE NVD Issuing CNA: Linux |
CVE Title: crypto: af_alg - Set merge to zero early in af_alg_sendmsg
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39931 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39931 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39947
MITRE NVD Issuing CNA: Linux |
CVE Title: net/mlx5e: Harden uplink netdev access against device unbind
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39947 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39947 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-10728
MITRE NVD Issuing CNA: TQtC |
CVE Title: Uncontrolled recursion in Qt SVG module
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Oct-25     Information published. |
Important | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-10728 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 qtsvg 6.6.1-2 on Azure Linux 3.0 | Important | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
Unknown | Unknown | None | |
cbl2 qt5-qtsvg 5.12.11-6 on CBL Mariner 2.0 | Important | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-10728 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-61985
MITRE NVD Issuing CNA: mitre |
CVE Title: ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.
CVSS: CVSS:3.1 Highest BaseScore:4.5/TemporalScore:4.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Oct-25     Information published. |
Low | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-61985 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 openssh 9.8p1-4 on Azure Linux 3.0 | Low | Unknown | None | Base: 3.6 Temporal: 3.6 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N |
Unknown | Unknown | None | |
cbl2 openssh 8.9p1-8 on CBL Mariner 2.0 | CBL-Mariner Releases (Security Update) | Moderate | Unknown | Base: 4.5 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U |
8.9p1-9 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-61985 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-61984
MITRE NVD Issuing CNA: mitre |
CVE Title: ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
CVSS: CVSS:3.1 Highest BaseScore:3.6/TemporalScore:3.6
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Oct-25     Information published. |
Low | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-61984 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 openssh 9.8p1-4 on Azure Linux 3.0 | Low | Unknown | None | Base: 3.6 Temporal: 3.6 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N |
Unknown | Unknown | None | |
cbl2 openssh 8.9p1-8 on CBL Mariner 2.0 | Low | Unknown | None | Base: 3.6 Temporal: 3.6 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-61984 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-39955
MITRE NVD Issuing CNA: Linux |
CVE Title: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39955 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 7.1 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39955 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-46819
MITRE NVD Issuing CNA: GitHub_M |
CVE Title: Redis is vulnerable to DoS via specially crafted LUA scripts
CVSS: CVSS:3.1 Highest BaseScore:6.3/TemporalScore:6.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-46819 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 ceph 18.2.2-10 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 6.3 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H |
Unknown | Unknown | None | |
azl3 valkey 8.0.4-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Moderate | Unknown | Base: 6.3 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H |
8.0.6-1 |
No | None | |
cbl2 ceph 16.2.10-9 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 6.3 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H |
Unknown | Unknown | None | |
cbl2 redis 6.2.18-3 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 6.3 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H |
Unknown | Unknown | None | |
cbl2 redis 6.2.20-1 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 6.3 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-46819 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-11412
MITRE NVD Issuing CNA: VulDB |
CVE Title: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
CVSS: CVSS:3.1 Highest BaseScore:3.3/TemporalScore:3.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11412 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 binutils 2.41-7 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 binutils 2.37-16 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 binutils 2.37-17 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 gdb 11.2-6 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 gdb 11.2-7 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-11412 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-37727
MITRE NVD Issuing CNA: elastic |
CVE Title: Elasticsearch Insertion of sensitive information in log file
CVSS: CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-37727 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 rubygem-elasticsearch 8.9.0-1 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.7 Temporal: 5.7 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
Unknown | Unknown | None | |
cbl2 rubygem-elasticsearch 8.3.0-1 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 5.7 Temporal: 5.7 Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-37727 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39927
MITRE NVD Issuing CNA: Linux |
CVE Title: ceph: fix race condition validating r_parent before applying state
CVSS: CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39927 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 4.7 Temporal: 4.7 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39927 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39891
MITRE NVD Issuing CNA: Linux |
CVE Title: wifi: mwifiex: Initialize the chan_stats array to zero
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39891 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39891 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39901
MITRE NVD Issuing CNA: Linux |
CVE Title: i40e: remove read access to debugfs files
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Important | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39901 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Important | Unknown | None | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39901 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39909
MITRE NVD Issuing CNA: Linux |
CVE Title: mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39909 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39909 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39910
MITRE NVD Issuing CNA: Linux |
CVE Title: mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Critical | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39910 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Critical | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39910 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39902
MITRE NVD Issuing CNA: Linux |
CVE Title: mm/slub: avoid accessing metadata when pointer is invalid in object_err()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39902 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39902 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39916
MITRE NVD Issuing CNA: Linux |
CVE Title: mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39916 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39916 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39923
MITRE NVD Issuing CNA: Linux |
CVE Title: dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39923 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39923 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39925
MITRE NVD Issuing CNA: Linux |
CVE Title: can: j1939: implement NETDEV_UNREGISTER notification handler
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Critical | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39925 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Critical | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39925 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39898
MITRE NVD Issuing CNA: Linux |
CVE Title: e1000e: fix heap overflow in e1000_set_eeprom
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Critical | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39898 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Critical | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39898 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39914
MITRE NVD Issuing CNA: Linux |
CVE Title: tracing: Silence warning when chunk allocation fails in trace_pid_write
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39914 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39914 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-53469
MITRE NVD Issuing CNA: Linux |
CVE Title: af_unix: Fix null-ptr-deref in unix_stream_sendpage().
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Important | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-53469 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Important | Unknown | None | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2023-53469 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-39905
MITRE NVD Issuing CNA: Linux |
CVE Title: net: phylink: add lock for serializing concurrent pl->phydev writes with resolver
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39905 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 7.1 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39905 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-39911
MITRE NVD Issuing CNA: Linux |
CVE Title: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path
CVSS: CVSS:3.1 Highest BaseScore:3.3/TemporalScore:3.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Low | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39911 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Low | Unknown | None | Base: 3.3 Temporal: 3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39911 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39920
MITRE NVD Issuing CNA: Linux |
CVE Title: pcmcia: Add error handling for add_interval() in do_validate_mem()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39920 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39920 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-39913
MITRE NVD Issuing CNA: Linux |
CVE Title: tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.
CVSS: CVSS:3.1 Highest BaseScore:6.6/TemporalScore:6.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39913 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 6.6 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39913 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39907
MITRE NVD Issuing CNA: Linux |
CVE Title: mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Oct-25     Information published. |
Critical | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39907 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Critical | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39907 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39952
MITRE NVD Issuing CNA: Linux |
CVE Title: wifi: wilc1000: avoid buffer overflow in WID string configuration
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Important | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39952 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Important | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39952 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-39953
MITRE NVD Issuing CNA: Linux |
CVE Title: cgroup: split cgroup_destroy_wq into 3 workqueues
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39953 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39953 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-39940
MITRE NVD Issuing CNA: Linux |
CVE Title: dm-stripe: fix a possible integer overflow
CVSS: CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.6
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39940 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 6.1 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39940 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39944
MITRE NVD Issuing CNA: Linux |
CVE Title: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Oct-25     Information published. |
Important | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39944 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Important | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39944 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-50502
MITRE NVD Issuing CNA: Linux |
CVE Title: mm: /proc/pid/smaps_rollup: fix no vma's null-deref
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2022-50502 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-50502 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-11234
MITRE NVD Issuing CNA: redhat |
CVE Title: Qemu-kvm: vnc websocket handshake use-after-free
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11234 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 qemu 8.2.0-19 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 7.5 Temporal: 6.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U |
Unknown | Unknown | None | |
cbl2 qemu 6.2.0-24 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 7.5 Temporal: 6.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-11234 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-10729
MITRE NVD Issuing CNA: TQtC |
CVE Title: Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG
CVSS: CVSS:3.1 Highest BaseScore:9.3/TemporalScore:8.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Oct-25     Information published. |
Important | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-10729 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 qtsvg 6.6.1-2 on Azure Linux 3.0 | Important | Unknown | None | Base: 9.3 Temporal: 8.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U |
Unknown | Unknown | None | |
cbl2 qt5-qtsvg 5.12.11-6 on CBL Mariner 2.0 | Important | Unknown | None | Base: 9.3 Temporal: 8.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-10729 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-49844
MITRE NVD Issuing CNA: GitHub_M |
CVE Title: Redis Lua Use-After-Free may lead to remote code execution
CVSS: CVSS:3.1 Highest BaseScore:9.9/TemporalScore:9.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Oct-25     Information published. |
Critical | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49844 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 ceph 18.2.2-10 on Azure Linux 3.0 | Critical | Unknown | None | Base: 9.9 Temporal: 9.9 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
azl3 valkey 8.0.4-1 on Azure Linux 3.0 | Critical | Unknown | None | Base: 9.9 Temporal: 9.9 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
cbl2 ceph 16.2.10-9 on CBL Mariner 2.0 | Critical | Unknown | None | Base: 9.9 Temporal: 9.9 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
cbl2 redis 6.2.18-3 on CBL Mariner 2.0 | CBL-Mariner Releases (Security Update) | Critical | Unknown | Base: 9.9 Temporal: 9.9 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
6.2.20-1 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-49844 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-8291
MITRE NVD Issuing CNA: PSF |
CVE Title: ZIP64 End of Central Directory (EOCD) Locator record offset not checked
CVSS: CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-8291 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 python3 3.12.9-4 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 4.3 Temporal: 4.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
Unknown | Unknown | None | |
azl3 tensorflow 2.16.1-9 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 4.3 Temporal: 4.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U |
Unknown | Unknown | None | |
cbl2 python3 3.9.19-14 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 4.3 Temporal: 4.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
Unknown | Unknown | None | |
cbl2 python3 3.9.19-15 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 4.3 Temporal: 4.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-8291 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-39958
MITRE NVD Issuing CNA: Linux |
CVE Title: iommu/s390: Make attach succeed when the device was surprise removed
CVSS: CVSS:3.1 Highest BaseScore:4.0/TemporalScore:3.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Oct-25     Information published. |
Low | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39958 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Low | Unknown | None | Base: 4.0 Temporal: 3.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39958 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-39957
MITRE NVD Issuing CNA: Linux |
CVE Title: wifi: mac80211: increase scan_ies_len for S1G
CVSS: CVSS:3.1 Highest BaseScore:4.0/TemporalScore:3.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Oct-25     Information published. |
Low | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39957 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Low | Unknown | None | Base: 4.0 Temporal: 3.7 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39957 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-46817
MITRE NVD Issuing CNA: GitHub_M |
CVE Title: Lua library commands may lead to integer overflow and potential RCE
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Oct-25     Information published. |
Important | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-46817 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 valkey 8.0.4-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Important | Unknown | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
8.0.6-1 |
No | None | |
cbl2 redis 6.2.18-3 on CBL Mariner 2.0 | Important | Unknown | None | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
cbl2 redis 6.2.20-1 on CBL Mariner 2.0 | Important | Unknown | None | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-46817 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-46818
MITRE NVD Issuing CNA: GitHub_M |
CVE Title: Redis: Authenticated users can execute LUA scripts as a different user
CVSS: CVSS:3.1 Highest BaseScore:6.0/TemporalScore:6.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-46818 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 valkey 8.0.4-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Moderate | Unknown | Base: 6.0 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N |
8.0.6-1 |
No | None | |
cbl2 redis 6.2.20-1 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 6.0 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-46818 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39961
MITRE NVD Issuing CNA: Linux |
CVE Title: iommu/amd/pgtbl: Fix possible race while increase page table level
CVSS: CVSS:3.1 Highest BaseScore:5.8/TemporalScore:5.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39961 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 5.8 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-39961 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-11495
MITRE NVD Issuing CNA: VulDB |
CVE Title: GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow
CVSS: CVSS:3.1 Highest BaseScore:3.3/TemporalScore:3.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11495 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 binutils 2.41-7 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
azl3 crash 8.0.4-4 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 binutils 2.37-16 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 binutils 2.37-17 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 crash 8.0.1-4 on CBL Mariner 2.0 | Low | Unknown | None | Base: 3.3 Temporal: 3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U |
Unknown | Unknown | None | |
cbl2 gdb 11.2-6 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 gdb 11.2-7 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-11495 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-11413
MITRE NVD Issuing CNA: VulDB |
CVE Title: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
CVSS: CVSS:3.1 Highest BaseScore:3.3/TemporalScore:3.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11413 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 binutils 2.41-7 on Azure Linux 3.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 binutils 2.37-16 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 binutils 2.37-17 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 gdb 11.2-6 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 gdb 11.2-7 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-11413 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-11414
MITRE NVD Issuing CNA: VulDB |
CVE Title: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
CVSS: CVSS:3.1 Highest BaseScore:3.3/TemporalScore:3.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    11-Oct-25     Information published. |
Moderate | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-11414 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 binutils 2.41-7 on Azure Linux 3.0 | Low | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 binutils 2.37-16 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 binutils 2.37-17 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 gdb 11.2-6 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None | |
cbl2 gdb 11.2-7 on CBL Mariner 2.0 | Moderate | Unknown | None | Base: 3.3 Temporal: 3.0 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-11414 | None |