Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
Microsoft.NET CVE-2025-55247 .NET Elevation of Privilege Vulnerability
Microsoft.NET, .NET Framework, Visual Studio CVE-2025-55248 .NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability
MicrosoftActive Directory Federation Services CVE-2025-59258 Windows Active Directory Federation Services (ADFS) Information Disclosure Vulnerability
MicrosoftAgere Windows Modem Driver CVE-2025-24990 Windows Agere Modem Driver Elevation of Privilege Vulnerability
MicrosoftAgere Windows Modem Driver CVE-2025-24052 Windows Agere Modem Driver Elevation of Privilege Vulnerability
AMDAMD Restricted Memory Page CVE-2025-0033 AMD CVE-2025-0033: RMP Corruption During SNP Initialization
MicrosoftASP.NET Core CVE-2025-55315 ASP.NET Security Feature Bypass Vulnerability
MicrosoftAzure Connected Machine Agent CVE-2025-47989 Azure Connected Machine Agent Elevation of Privilege Vulnerability
MicrosoftAzure Connected Machine Agent CVE-2025-58724 Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability
MicrosoftAzure Entra ID CVE-2025-59218 Azure Entra ID Elevation of Privilege Vulnerability
MicrosoftAzure Entra ID CVE-2025-59246 Azure Entra ID Elevation of Privilege Vulnerability
MicrosoftAzure Local CVE-2025-55697 Azure Local Elevation of Privilege Vulnerability
MicrosoftAzure Monitor CVE-2025-55321 Azure Monitor Log Analytics Spoofing Vulnerability
MicrosoftAzure Monitor Agent CVE-2025-59285 Azure Monitor Agent Elevation of Privilege Vulnerability
MicrosoftAzure Monitor Agent CVE-2025-59494 Azure Monitor Agent Elevation of Privilege Vulnerability
MicrosoftAzure PlayFab CVE-2025-59247 Azure PlayFab Elevation of Privilege Vulnerability
MicrosoftConfidential Azure Container Instances CVE-2025-59292 Azure Compute Gallery Elevation of Privilege Vulnerability
MicrosoftConfidential Azure Container Instances CVE-2025-59291 Confidential Azure Container Instances Elevation of Privilege Vulnerability
MicrosoftConnected Devices Platform Service (Cdpsvc) CVE-2025-59191 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
MicrosoftConnected Devices Platform Service (Cdpsvc) CVE-2025-55326 Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability
MicrosoftConnected Devices Platform Service (Cdpsvc) CVE-2025-58719 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
MicrosoftCopilot CVE-2025-59272 Copilot Spoofing Vulnerability
MicrosoftCopilot CVE-2025-59252 M365 Copilot Spoofing Vulnerability
MicrosoftCopilot CVE-2025-59286 Copilot Spoofing Vulnerability
MicrosoftData Sharing Service Client CVE-2025-59200 Data Sharing Service Spoofing Vulnerability
MITREGames CVE-2025-59489 MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability
MicrosoftGitHub CVE-2025-59288 Playwright Spoofing Vulnerability
MicrosoftInbox COM Objects CVE-2025-58735 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
MicrosoftInbox COM Objects CVE-2025-58732 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
MicrosoftInbox COM Objects CVE-2025-59282 Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
MicrosoftInbox COM Objects CVE-2025-58733 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
MicrosoftInbox COM Objects CVE-2025-58734 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
MicrosoftInbox COM Objects CVE-2025-58738 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
MicrosoftInbox COM Objects CVE-2025-58731 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
MicrosoftInbox COM Objects CVE-2025-58730 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
MicrosoftInbox COM Objects CVE-2025-58736 Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
MicrosoftInternet Explorer CVE-2025-59295 Windows URL Parsing Remote Code Execution Vulnerability
MicrosoftJDBC Driver for SQL Server CVE-2025-59250 JDBC Driver for SQL Server Spoofing Vulnerability
LinuxMariner CVE-2025-39943 ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer
LinuxMariner CVE-2025-39946 tls: make sure to abort the stream if headers are bogus
LinuxMariner CVE-2025-39942 ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size
LinuxMariner CVE-2025-39951 um: virtio_uml: Fix use-after-free after put_device in probe
LinuxMariner CVE-2025-39932 smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work)
LinuxMariner CVE-2025-39949 qed: Don't collect too many protection override GRC elements
LinuxMariner CVE-2025-39937 net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer
LinuxMariner CVE-2025-39955 tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
LinuxMariner CVE-2025-39895 sched: Fix sched_numa_find_nth_cpu() if mask offline
VulDBMariner CVE-2025-11413 GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
VulDBMariner CVE-2025-11414 GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
LinuxMariner CVE-2025-39938 ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed
VulDBMariner CVE-2025-11495 GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow
LinuxMariner CVE-2025-39934 drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ
LinuxMariner CVE-2025-39929 smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path
LinuxMariner CVE-2025-39945 cnic: Fix use-after-free bugs in cnic_delete_task
LinuxMariner CVE-2025-39907 mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer
LinuxMariner CVE-2025-39913 tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.
LinuxMariner CVE-2025-39952 wifi: wilc1000: avoid buffer overflow in WID string configuration
LinuxMariner CVE-2025-39940 dm-stripe: fix a possible integer overflow
LinuxMariner CVE-2025-39953 cgroup: split cgroup_destroy_wq into 3 workqueues
LinuxMariner CVE-2023-53469 af_unix: Fix null-ptr-deref in unix_stream_sendpage().
LinuxMariner CVE-2025-39914 tracing: Silence warning when chunk allocation fails in trace_pid_write
LinuxMariner CVE-2025-39905 net: phylink: add lock for serializing concurrent pl->phydev writes with resolver
LinuxMariner CVE-2025-39920 pcmcia: Add error handling for add_interval() in do_validate_mem()
LinuxMariner CVE-2025-39911 i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path
LinuxMariner CVE-2025-39958 iommu/s390: Make attach succeed when the device was surprise removed
PSFMariner CVE-2025-8291 ZIP64 End of Central Directory (EOCD) Locator record offset not checked
LinuxMariner CVE-2025-39957 wifi: mac80211: increase scan_ies_len for S1G
GitHub_MMariner CVE-2025-46818 Redis: Authenticated users can execute LUA scripts as a different user
GitHub_MMariner CVE-2025-46817 Lua library commands may lead to integer overflow and potential RCE
LinuxMariner CVE-2022-50502 mm: /proc/pid/smaps_rollup: fix no vma's null-deref
LinuxMariner CVE-2025-39944 octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()
redhatMariner CVE-2025-11234 Qemu-kvm: vnc websocket handshake use-after-free
GitHub_MMariner CVE-2025-49844 Redis Lua Use-After-Free may lead to remote code execution
TQtCMariner CVE-2025-10729 Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG
LinuxMariner CVE-2025-39961 iommu/amd/pgtbl: Fix possible race while increase page table level
mitreMariner CVE-2025-61984 ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
GitHub_MMariner CVE-2025-46819 Redis is vulnerable to DoS via specially crafted LUA scripts
elasticMariner CVE-2025-37727 Elasticsearch Insertion of sensitive information in log file
VulDBMariner CVE-2025-11412 GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
LinuxMariner CVE-2025-39931 crypto: af_alg - Set merge to zero early in af_alg_sendmsg
LinuxMariner CVE-2025-39933 smb: client: let recv_done verify data_offset, data_length and remaining_data_length
LinuxMariner CVE-2025-39947 net/mlx5e: Harden uplink netdev access against device unbind
mitreMariner CVE-2025-61985 ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.
TQtCMariner CVE-2025-10728 Uncontrolled recursion in Qt SVG module
LinuxMariner CVE-2025-39916 mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()
LinuxMariner CVE-2025-39902 mm/slub: avoid accessing metadata when pointer is invalid in object_err()
LinuxMariner CVE-2025-39923 dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees
LinuxMariner CVE-2025-39898 e1000e: fix heap overflow in e1000_set_eeprom
LinuxMariner CVE-2025-39925 can: j1939: implement NETDEV_UNREGISTER notification handler
LinuxMariner CVE-2025-39891 wifi: mwifiex: Initialize the chan_stats array to zero
LinuxMariner CVE-2025-39927 ceph: fix race condition validating r_parent before applying state
LinuxMariner CVE-2025-39901 i40e: remove read access to debugfs files
LinuxMariner CVE-2025-39910 mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()
LinuxMariner CVE-2025-39909 mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()
MicrosoftMicrosoft Brokering File System CVE-2025-48004 Microsoft Brokering File System Elevation of Privilege Vulnerability
MicrosoftMicrosoft Brokering File System CVE-2025-59189 Microsoft Brokering File System Elevation of Privilege Vulnerability
MicrosoftMicrosoft Configuration Manager CVE-2025-55320 Configuration Manager Elevation of Privilege Vulnerability
MicrosoftMicrosoft Configuration Manager CVE-2025-59213 Configuration Manager Elevation of Privilege Vulnerability
MicrosoftMicrosoft Defender for Linux CVE-2025-59497 Microsoft Defender for Linux Denial of Service Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2025-11213 Chromium: CVE-2025-11213 Inappropriate implementation in Omnibox
ChromeMicrosoft Edge (Chromium-based) CVE-2025-11210 Chromium: CVE-2025-11210 Side-channel information leakage in Tab
ChromeMicrosoft Edge (Chromium-based) CVE-2025-11460 Chromium: CVE-2025-11460 Use after free in Storage
ChromeMicrosoft Edge (Chromium-based) CVE-2025-11458 Chromium: CVE-2025-11458 Heap buffer overflow in Sync
ChromeMicrosoft Edge (Chromium-based) CVE-2025-11215 Chromium: CVE-2025-11215 Off by one error in V8
ChromeMicrosoft Edge (Chromium-based) CVE-2025-11216 Chromium: CVE-2025-11216 Inappropriate implementation in Storage
ChromeMicrosoft Edge (Chromium-based) CVE-2025-11208 Chromium: CVE-2025-11208 Inappropriate implementation in Media
ChromeMicrosoft Edge (Chromium-based) CVE-2025-11212 Chromium: CVE-2025-11212 Inappropriate implementation in Media
ChromeMicrosoft Edge (Chromium-based) CVE-2025-11211 Chromium: CVE-2025-11211 Out of bounds read in Media
ChromeMicrosoft Edge (Chromium-based) CVE-2025-11205 Chromium: CVE-2025-11205 Heap buffer overflow in WebGPU
ChromeMicrosoft Edge (Chromium-based) CVE-2025-11207 Chromium: CVE-2025-11207 Side-channel information leakage in Storage
ChromeMicrosoft Edge (Chromium-based) CVE-2025-11209 Chromium: CVE-2025-11209 Inappropriate implementation in Omnibox
ChromeMicrosoft Edge (Chromium-based) CVE-2025-11206 Chromium: CVE-2025-11206 Heap buffer overflow in Video
ChromeMicrosoft Edge (Chromium-based) CVE-2025-11219 Chromium: CVE-2025-11219 Use after free in V8
MicrosoftMicrosoft Exchange Server CVE-2025-59248 Microsoft Exchange Server Spoofing Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2025-59249 Microsoft Exchange Server Elevation of Privilege Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2025-53782 Microsoft Exchange Server Elevation of Privilege Vulnerability
MicrosoftMicrosoft Failover Cluster Virtual Driver CVE-2025-59260 Microsoft Failover Cluster Virtual Driver Information Disclosure Vulnerability
MicrosoftMicrosoft Graphics Component CVE-2025-59195 Microsoft Graphics Component Denial of Service Vulnerability
MITREMicrosoft Graphics Component CVE-2016-9535 MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow Vulnerability
MicrosoftMicrosoft Graphics Component CVE-2025-59261 Windows Graphics Component Elevation of Privilege Vulnerability
MicrosoftMicrosoft Graphics Component CVE-2025-49708 Microsoft Graphics Component Elevation of Privilege Vulnerability
MicrosoftMicrosoft Graphics Component CVE-2025-59205 Windows Graphics Component Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office CVE-2025-59229 Microsoft Office Denial of Service Vulnerability
MicrosoftMicrosoft Office CVE-2025-59227 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-59234 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-59223 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-59224 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-59225 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-59232 Microsoft Excel Information Disclosure Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-59235 Microsoft Excel Information Disclosure Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-59233 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-59231 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-59236 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-59243 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office PowerPoint CVE-2025-59238 Microsoft PowerPoint Remote Code Execution Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2025-59237 Microsoft SharePoint Remote Code Execution Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2025-59228 Microsoft SharePoint Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Visio CVE-2025-59226 Microsoft Office Visio Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-59222 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-59221 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft PowerShell CVE-2025-25004 PowerShell Elevation of Privilege Vulnerability
MicrosoftMicrosoft Windows CVE-2025-55701 Windows Authentication Elevation of Privilege Vulnerability
MITREMicrosoft Windows Codecs Library CVE-2025-54957 MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder
MicrosoftMicrosoft Windows Search Component CVE-2025-59198 Windows Search Service Denial of Service Vulnerability
MicrosoftMicrosoft Windows Search Component CVE-2025-59190 Windows Search Service Denial of Service Vulnerability
MicrosoftMicrosoft Windows Search Component CVE-2025-59253 Windows Search Service Denial of Service Vulnerability
MicrosoftMicrosoft Windows Speech CVE-2025-58715 Windows Speech Runtime Elevation of Privilege Vulnerability
MicrosoftMicrosoft Windows Speech CVE-2025-58716 Windows Speech Runtime Elevation of Privilege Vulnerability
MicrosoftNetwork Connection Status Indicator (NCSI) CVE-2025-59201 Network Connection Status Indicator (NCSI) Elevation of Privilege Vulnerability
MicrosoftNtQueryInformation Token function (ntifs.h) CVE-2025-55696 NtQueryInformation Token function (ntifs.h) Elevation of Privilege Vulnerability
MicrosoftRedis Enterprise CVE-2025-59271 Redis Enterprise Elevation of Privilege Vulnerability
MicrosoftRemote Desktop Client CVE-2025-58718 Remote Desktop Client Remote Code Execution Vulnerability
MicrosoftSoftware Protection Platform (SPP) CVE-2025-59199 Software Protection Platform (SPP) Elevation of Privilege Vulnerability
MicrosoftStorport.sys Driver CVE-2025-59192 Storport.sys Driver Elevation of Privilege Vulnerability
CERT/CCTCG TPM2.0 CVE-2025-2884 Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation
MicrosoftVirtual Secure Mode CVE-2025-48813 Virtual Secure Mode Spoofing Vulnerability
MicrosoftVisual Studio CVE-2025-55240 Visual Studio Elevation of Privilege Vulnerability
GitHubVisual Studio CVE-2025-54132 GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram Tool
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-58714 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2025-59242 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Authentication Methods CVE-2025-59277 Windows Authentication Elevation of Privilege Vulnerability
MicrosoftWindows Authentication Methods CVE-2025-59278 Windows Authentication Elevation of Privilege Vulnerability
MicrosoftWindows Authentication Methods CVE-2025-59275 Windows Authentication Elevation of Privilege Vulnerability
MicrosoftWindows BitLocker CVE-2025-55337 Windows BitLocker Security Feature Bypass Vulnerability
MicrosoftWindows BitLocker CVE-2025-55332 Windows BitLocker Security Feature Bypass Vulnerability
MicrosoftWindows BitLocker CVE-2025-55333 Windows BitLocker Security Feature Bypass Vulnerability
MicrosoftWindows BitLocker CVE-2025-55330 Windows BitLocker Security Feature Bypass Vulnerability
MicrosoftWindows BitLocker CVE-2025-55338 Windows BitLocker Security Feature Bypass Vulnerability
MicrosoftWindows BitLocker CVE-2025-55682 Windows BitLocker Security Feature Bypass Vulnerability
MicrosoftWindows Bluetooth Service CVE-2025-59290 Windows Bluetooth Service Elevation of Privilege Vulnerability
MicrosoftWindows Bluetooth Service CVE-2025-58728 Windows Bluetooth Service Elevation of Privilege Vulnerability
MicrosoftWindows Bluetooth Service CVE-2025-59289 Windows Bluetooth Service Elevation of Privilege Vulnerability
MicrosoftWindows Cloud Files Mini Filter Driver CVE-2025-55680 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
MicrosoftWindows Cloud Files Mini Filter Driver CVE-2025-55336 Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
MicrosoftWindows COM CVE-2025-58725 Windows COM+ Event System Service Elevation of Privilege Vulnerability
MicrosoftWindows Connected Devices Platform Service CVE-2025-58727 Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
MicrosoftWindows Core Shell CVE-2025-59185 NTLM Hash Disclosure Spoofing Vulnerability
MicrosoftWindows Core Shell CVE-2025-59244 NTLM Hash Disclosure Spoofing Vulnerability
MicrosoftWindows Cryptographic Services CVE-2025-58720 Windows Cryptographic Services Information Disclosure Vulnerability
MicrosoftWindows Device Association Broker service CVE-2025-50174 Windows Device Association Broker Service Elevation of Privilege Vulnerability
MicrosoftWindows Device Association Broker service CVE-2025-55677 Windows Device Association Broker Service Elevation of Privilege Vulnerability
MicrosoftWindows Digital Media CVE-2025-53150 Windows Digital Media Elevation of Privilege Vulnerability
MicrosoftWindows Digital Media CVE-2025-50175 Windows Digital Media Elevation of Privilege Vulnerability
MicrosoftWindows DirectX CVE-2025-55678 DirectX Graphics Kernel Elevation of Privilege Vulnerability
MicrosoftWindows DirectX CVE-2025-55698 DirectX Graphics Kernel Denial of Service Vulnerability
MicrosoftWindows DWM CVE-2025-58722 Microsoft DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows DWM CVE-2025-55681 Desktop Windows Manager Elevation of Privilege Vulnerability
MicrosoftWindows DWM Core Library CVE-2025-59255 Windows DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows DWM Core Library CVE-2025-59254 Microsoft DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows Error Reporting CVE-2025-55692 Windows Error Reporting Service Elevation of Privilege Vulnerability
MicrosoftWindows Error Reporting CVE-2025-55694 Windows Error Reporting Service Elevation of Privilege Vulnerability
MicrosoftWindows ETL Channel CVE-2025-59197 Windows ETL Channel Information Disclosure Vulnerability
MicrosoftWindows Failover Cluster CVE-2025-59188 Microsoft Failover Cluster Information Disclosure Vulnerability
MicrosoftWindows Failover Cluster CVE-2025-47979 Microsoft Failover Cluster Information Disclosure Vulnerability
MicrosoftWindows File Explorer CVE-2025-59214 Microsoft Windows File Explorer Spoofing Vulnerability
MicrosoftWindows File Explorer CVE-2025-58739 Microsoft Windows File Explorer Spoofing Vulnerability
MicrosoftWindows Health and Optimized Experiences Service CVE-2025-59241 Windows Health and Optimized Experiences Elevation of Privilege Vulnerability
MicrosoftWindows Hello CVE-2025-53139 Windows Hello Security Feature Bypass Vulnerability
MicrosoftWindows High Availability Services CVE-2025-59184 Storage Spaces Direct Information Disclosure Vulnerability
MicrosoftWindows Hyper-V CVE-2025-55328 Windows Hyper-V Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2025-55679 Windows Kernel Information Disclosure Vulnerability
MicrosoftWindows Kernel CVE-2025-55683 Windows Kernel Information Disclosure Vulnerability
MicrosoftWindows Kernel CVE-2025-59207 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2025-55334 Windows Kernel Security Feature Bypass Vulnerability
MicrosoftWindows Kernel CVE-2025-59186 Windows Kernel Information Disclosure Vulnerability
MicrosoftWindows Kernel CVE-2025-55693 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2025-59194 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2025-59187 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2025-50152 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2025-55699 Windows Kernel Information Disclosure Vulnerability
MicrosoftWindows Local Session Manager (LSM) CVE-2025-58729 Windows Local Session Manager (LSM) Denial of Service Vulnerability
MicrosoftWindows Local Session Manager (LSM) CVE-2025-59257 Windows Local Session Manager (LSM) Denial of Service Vulnerability
MicrosoftWindows Local Session Manager (LSM) CVE-2025-59259 Windows Local Session Manager (LSM) Denial of Service Vulnerability
MicrosoftWindows Management Services CVE-2025-59193 Windows Management Services Elevation of Privilege Vulnerability
MicrosoftWindows Management Services CVE-2025-59204 Windows Management Services Information Disclosure Vulnerability
MicrosoftWindows MapUrlToZone CVE-2025-59208 Windows MapUrlToZone Information Disclosure Vulnerability
MicrosoftWindows NDIS CVE-2025-55339 Windows Network Driver Interface Specification Driver Elevation of Privilege Vulnerability
MicrosoftWindows NTFS CVE-2025-55335 Windows NTFS Elevation of Privilege Vulnerability
MicrosoftWindows NTLM CVE-2025-59284 Windows NTLM Spoofing Vulnerability
MicrosoftWindows PrintWorkflowUserSvc CVE-2025-55331 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
MicrosoftWindows PrintWorkflowUserSvc CVE-2025-55689 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
MicrosoftWindows PrintWorkflowUserSvc CVE-2025-55685 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
MicrosoftWindows PrintWorkflowUserSvc CVE-2025-55686 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
MicrosoftWindows PrintWorkflowUserSvc CVE-2025-55690 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
MicrosoftWindows PrintWorkflowUserSvc CVE-2025-55684 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
MicrosoftWindows PrintWorkflowUserSvc CVE-2025-55688 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
MicrosoftWindows PrintWorkflowUserSvc CVE-2025-55691 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
MicrosoftWindows Push Notification Core CVE-2025-59209 Windows Push Notification Information Disclosure Vulnerability
MicrosoftWindows Push Notification Core CVE-2025-59211 Windows Push Notification Information Disclosure Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2025-59230 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
MicrosoftWindows Remote Desktop CVE-2025-58737 Remote Desktop Protocol Remote Code Execution Vulnerability
MicrosoftWindows Remote Desktop Protocol CVE-2025-55340 Windows Remote Desktop Protocol Security Feature Bypass
MicrosoftWindows Remote Desktop Services CVE-2025-59202 Windows Remote Desktop Services Elevation of Privilege Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2025-59502 Remote Procedure Call Denial of Service Vulnerability
MicrosoftWindows Resilient File System (ReFS) CVE-2025-55687 Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
MicrosoftWindows Resilient File System (ReFS) Deduplication Service CVE-2025-59210 Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
MicrosoftWindows Resilient File System (ReFS) Deduplication Service CVE-2025-59206 Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-58717 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-55700 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MITREWindows Secure Boot CVE-2025-47827 MITRE CVE-2025-47827: Secure Boot bypass in IGEL OS before 11
MicrosoftWindows Server Update Service CVE-2025-59287 Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
MicrosoftWindows SMB Client CVE-2025-59280 Windows SMB Client Tampering Vulnerability
MicrosoftWindows SMB Server CVE-2025-58726 Windows SMB Server Elevation of Privilege Vulnerability
MicrosoftWindows SSDP Service CVE-2025-59196 Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
MicrosoftWindows StateRepository API CVE-2025-59203 Windows State Repository API Server File Information Disclosure Vulnerability
MicrosoftWindows Storage Management Provider CVE-2025-55325 Windows Storage Management Provider Information Disclosure Vulnerability
MicrosoftWindows Taskbar Live CVE-2025-59294 Windows Taskbar Live Preview Information Disclosure Vulnerability
MicrosoftWindows USB Video Driver CVE-2025-55676 Windows USB Video Class System Driver Information Disclosure Vulnerability
MicrosoftWindows Virtualization-Based Security (VBS) Enclave CVE-2025-53717 Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
MicrosoftWindows WLAN Auto Config Service CVE-2025-55695 Windows WLAN AutoConfig Service Information Disclosure Vulnerability
MicrosoftXbox CVE-2025-53768 Xbox IStorageService Elevation of Privilege Vulnerability
MicrosoftXBox Gaming Services CVE-2025-59281 Xbox Gaming Services Elevation of Privilege Vulnerability

CVE-2025-47989 - Azure Connected Machine Agent Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-47989
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could an attacker gain with successful exploitation?

An attacker who successfully exploited the vulnerability could elevate their privileges as ‘NT AUTHORITY\SYSTEM’ user and perform arbitrary code execution.


What actions do customers need to take to protect themselves from this vulnerability?

Customers should update their Azure Connected Machine Agent to the latest version. For more information, see What's new with Azure Connected Machine agent.


According to the CVSS metric, the attack vector is local (AV:L) and privileges required is low (PR:L). What does this mean in the context of this elevation of privilege vulnerability?

An attacker needs to be authorized as a standard user on the localhost to execute this attack. They could then elevate their privileges to perform unauthorized operations.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-47989
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Arc Enabled Servers - Azure Connected Machine Agent Release Notes (Security Update)
Release Notes (Security Update)
Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
xxxxx
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-47989 Sharan Patil with WithSecure Consulting


CVE-2025-0033 - AMD CVE-2025-0033: RMP Corruption During SNP Initialization

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-0033
MITRE
NVD

Issuing CNA: AMD

CVE Title: AMD CVE-2025-0033: RMP Corruption During SNP Initialization
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Microsoft is aware of AMD-SB-3020 | CVE-2025-0033 disclosed by AMD on October 13, 2025.

CVE-2025-0033 is a vulnerability in AMD EPYC processors using Secure Encrypted Virtualization – Secure Nested Paging (SEV-SNP). It involves a race condition during Reverse Map Table (RMP) initialization that could allow a malicious or compromised hypervisor to modify RMP entries before they are locked, potentially impacting the integrity of SEV-SNP guest memory. This issue does not expose plaintext data or secrets and requires privileged control of the hypervisor to exploit.

Across Azure Confidential Computing products, multiple security guardrails are in place to prevent host compromise, combining isolation, integrity verification and continuous monitoring. All host operations follow audited and approved management pathways, with administrative access strictly controlled, limited and logged. Together, these protections reduce the risk of host compromise or unauthorized memory manipulation, helping ensure that confidential workloads and customer VMs maintain their confidentiality and integrity on Azure hosts.


FAQ:

When will an update be available to address this vulnerability?

Updates to mitigate this vulnerability in Azure Confidential Computing's (ACC) AMD-based clusters are being developed but are not yet complete. Once complete, the updates with be deployed across all AMD-based infrastructure and customers will be notified via Azure Service Health Alerts if they are required to reboot their ACC resources. The Security Updates table for this CVE will be updated immediately upon availability of the mitigated versions for any affected ACC product SKUs.

Additionally, customers who have subscribed to the Security Update Guide will be notified when this CVE is revised to indicate updates are available. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this CVE.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Oct-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely Yes No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-0033
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Confidential Compute VM SKU DCasv5/DCadsv5 Critical Remote Code Execution None Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Azure Confidential Compute VM SKU DCasv6/DCadsv6 Critical Remote Code Execution None Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Azure Confidential Compute VM SKU ECasv5/ECadsv5 Critical Remote Code Execution None Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Azure Confidential Compute VM SKU ECasv6/ECadsv6 Critical Remote Code Execution None Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-0033 Benedict Schlueter, Supraja Sridhara, and Shweta Shinde from ETH Zurich


CVE-2025-48004 - Microsoft Brokering File System Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-48004
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-48004
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-48004 hazard


Bryan Gonzalez, Ocelot Team @ Metabase Q


CVE-2025-50174 - Windows Device Association Broker Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50174
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Device Association Broker Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Device Association Broker service allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker could use this vulnerability to elevate privileges from Medium Integrity Level to Local Service.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50174
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50174 Jongseong Kim (nevul37) with Ajou University, and working at ENKI WhiteHat


Dongjun Kim (smlijun) with Ajou University, and working at ENKI WhiteHat


Anonymous


CVE-2025-53782 - Microsoft Exchange Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53782
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Incorrect implementation of authentication algorithm in Microsoft Exchange Server allows an unauthorized attacker to elevate privileges locally.


FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would be able to take over the mailboxes of all Exchange users, read emails, download attachments.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53782
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5066369 (Security Update) Important Elevation of Privilege 5063223
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.01.2507.061
Yes None
Microsoft Exchange Server 2019 Cumulative Update 14 5066368 (Security Update) Important Elevation of Privilege 5063222
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1544.036
Yes None
Microsoft Exchange Server 2019 Cumulative Update 15 5066367 (Security Update) Important Elevation of Privilege 5063221
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1748.039
Yes None
Microsoft Exchange Server Subscription Edition RTM 5066366 (Security Update) Important Elevation of Privilege 5063224
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.2562.029
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53782 zcgonvh's cat Vanilla


CVE-2025-55247 - .NET Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55247
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper link resolution before file access ('link following') in .NET allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain the privileges of the authenticated user.


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authenticated attacker could place a malicious file in the core project path and then wait for a user with admin privileges to create or build a .NET project to gain elevated privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55247
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 8.0 installed on Linux 5068331 (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.0.21
Maybe None
.NET 9.0 installed on Linux 5068332 (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
9.0.10
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55247 None

CVE-2025-55315 - ASP.NET Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55315
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: ASP.NET Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.9/TemporalScore:8.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Inconsistent interpretation of http requests ('http request/response smuggling') in ASP.NET Core allows an authorized attacker to bypass a security feature over a network.


FAQ:

How could an attacker exploit the vulnerability?

An authenticated attacker could exploit the vulnerability by sending a malicious http request to the web server.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to a high loss of confidentiality (C:H), and integrity (I:H) and some loss of availability (A:L). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could view sensitive information such as other user's credentials (Confidentiality) and make changes to file contents on the target server (Integrity), and they might be able to force a crash within the server (Availability).


What should I do to make sure my ASP.NET Core application is protected

  • If you are running .NET 8 or later install the .NET update from Microsoft Update, then restart your application or reboot the machine.

  • If you are running .NET 2.3 you must update the package reference for Microsoft.AspNet.Server.Kestrel.Core to 2.3.6, then recompile your application and redeploy.

  • If you are running a self-contained/single-file application, install the .NET update, recompile your application and redeploy.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could smuggle another HTTP request and bypass front-end security controls or hijack other users' credentials.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55315
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
ASP.NET Core 2.3 Release Notes (Security Update) Important Security Feature Bypass Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C
2.3.6
Maybe None
ASP.NET Core 8.0 5068331 (Security Update) Important Security Feature Bypass Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C
8.0.21
Maybe None
ASP.NET Core 9.0 5068332 (Security Update) Important Security Feature Bypass Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C
9.0.10
Maybe None
Microsoft Visual Studio 2022 version 17.10 Release Notes (Security Update) Important Security Feature Bypass Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C
17.10.20
Maybe None
Microsoft Visual Studio 2022 version 17.12 Release Notes (Security Update) Important Security Feature Bypass Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C
17.12.13
Maybe None
Microsoft Visual Studio 2022 version 17.14 Release Notes (Security Update) Important Security Feature Bypass Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C
17.14.17
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55315 Sid


CVE-2025-24990 - Windows Agere Modem Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24990
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Agere Modem Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update.

Fax modem hardware dependent on this specific driver will no longer work on Windows.

Microsoft recommends removing any existing dependencies on this hardware.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Is the vulnerability only exploitable if the Agere Modem is actively being used?

No. All supported versions of Windows can be affected by a successful exploitation of this vulnerability, even if the modem is not actively being used.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24990
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24990 Fabian Mosch with r-tec IT Security GmbH Jordan Jay


Anonymous


MSTIC


MSTIC


Fabian Mosch with r-tec IT Security GmbH Jordan Jay


CVE-2025-24052 - Windows Agere Modem Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24052
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Agere Modem Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.0
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems. This is an announcement of the upcoming removal of ltmdm64.sys driver. The driver has been removed in the October cumulative update.

Fax modem hardware dependent on this specific driver will no longer work on Windows.

Microsoft recommends removing any existing dependencies on this hardware.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Is the vulnerability only exploitable if the Agere Modem is actively being used?

No. All supported versions of Windows can be affected by a successful exploitation of this vulnerability, even if the modem is not actively being used.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely Yes No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24052
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24052 Anonymous


CVE-2025-55320 - Configuration Manager Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55320
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Configuration Manager Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain sysadmin privileges.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by injecting malicious SQL into the SyncToken method, allowing execution of arbitrary queries as the SMS service.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55320
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Configuration Manager 2403 Release Notes (Security Update) Important Elevation of Privilege Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
5.00.9128.1035
Maybe None
Microsoft Configuration Manager 2409 Release Notes (Security Update) Important Elevation of Privilege Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
5.00.9132.1029
Maybe None
Microsoft Configuration Manager 2503 Release Notes (Security Update) Important Elevation of Privilege Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
5.00.9135.1008
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55320 Mehdi Elyassa with Synacktiv


CVE-2025-55325 - Windows Storage Management Provider Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55325
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Storage Management Provider Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Buffer over-read in Windows Storage Management Provider allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55325
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55325 nerty_nerty(Ingyu Yang), Mukyoung Kwak, Seongheun Hong, Jaeseok Bae, Jiwon Jang, Seoyun Cho with Best of the Best 13th Team MSRC Gasan


insu with Theori


Anonymous


CVE-2025-55333 - Windows BitLocker Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55333
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows BitLocker Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Incomplete comparison with missing factors in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.


FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55333
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Security Feature Bypass 5065430
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Security Feature Bypass 5065430
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Security Feature Bypass 5065427
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Security Feature Bypass 5065427
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Security Feature Bypass 5065427
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Security Feature Bypass 5065427
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Security Feature Bypass 5065432
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Security Feature Bypass 5065432
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Security Feature Bypass 5065425
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55333 Alon Leviev with Microsoft (STORM)


Alon Leviev with Microsoft (STORM)


CVE-2025-55335 - Windows NTFS Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55335
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTFS Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows NTFS allows an unauthorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55335
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55335 Bruno Botelho


CVE-2025-55336 - Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55336
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows Cloud Files Mini Filter Driver allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55336
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55336 Chen Le Qi (@cplearns2h4ck) with STAR Labs SG Pte. Ltd.


CVE-2025-55338 - Windows BitLocker Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55338
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows BitLocker Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Missing Ability to Patch ROM Code in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.


FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55338
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Security Feature Bypass 5065430
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Security Feature Bypass 5065430
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Security Feature Bypass 5065427
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Security Feature Bypass 5065427
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Security Feature Bypass 5065427
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Security Feature Bypass 5065427
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Security Feature Bypass 5065432
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Security Feature Bypass 5065432
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Security Feature Bypass 5065425
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55338 Netanel Ben Simon with Microsoft (STORM)


Alon Leviev with Microsoft (STORM)


CVE-2025-55339 - Windows Network Driver Interface Specification Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55339
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Network Driver Interface Specification Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows NDIS allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55339
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55339 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-55340 - Windows Remote Desktop Protocol Security Feature Bypass

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55340
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Protocol Security Feature Bypass
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper authentication in Windows Remote Desktop Protocol allows an authorized attacker to bypass a security feature locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires multiple conditions to be met. The attacker must have access to a user's machine and the user must have initiated an RDP session. The attack must also be carried out within a certain amount of time from the initiation of the RDP session.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

This vulnerability could allow an attacker to bypass RDP authentication.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55340
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2022 5066782 (Security Update) Important Security Feature Bypass 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Security Feature Bypass 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Security Feature Bypass 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55340 Toaster


CVE-2025-55676 - Windows USB Video Class System Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55676
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows USB Video Class System Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Generation of error message containing sensitive information in Windows USB Video Driver allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55676
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55676 Chunyang Han


CVE-2025-55677 - Windows Device Association Broker Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55677
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Device Association Broker Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Untrusted pointer dereference in Windows Device Association Broker service allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker could use this vulnerability to elevate privileges from Medium Integrity Level to Local Service.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55677
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55677 Hwiwon Lee (hwiwonl), SEC-agent team


Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat


CVE-2025-55681 - Desktop Windows Manager Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55681
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Desktop Windows Manager Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows DWM allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to manipulate system operations in a specific manner.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55681
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55681 TyphoonPWN Windows PE Winner with SSD Secure Disclosure


CVE-2025-55685 - Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55685
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55685
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55685 Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat


Hwiwon Lee (hwiwonl), SEC-agent team


CVE-2025-55686 - Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55686
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55686
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55686 Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat


Hwiwon Lee (hwiwonl), SEC-agent team


CVE-2025-55687 - Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55687
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Resilient File System (ReFS) allows an unauthorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55687
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55687 None

CVE-2025-55689 - Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55689
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55689
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55689 Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat


Hwiwon Lee (hwiwonl), SEC-agent team


CVE-2025-55700 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55700
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55700
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Information Disclosure 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Information Disclosure 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Information Disclosure 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Information Disclosure 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Information Disclosure 5065468
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Information Disclosure 5065468
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Information Disclosure 5065509
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Information Disclosure 5065509
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Information Disclosure 5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Information Disclosure 5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55700 Anonymous


CVE-2025-55701 - Windows Authentication Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55701
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Authentication Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper validation of specified type of input in Microsoft Windows allows an authorized attacker to elevate privileges locally.


FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55701
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55701 k0shl with Kunlun Lab


CVE-2025-58715 - Windows Speech Runtime Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58715
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Speech Runtime Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Integer overflow or wraparound in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

This vulnerability could lead to a contained execution environment escape. Please refer to AppContainer Isolation for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58715
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58715 Anonymous


CVE-2025-58716 - Windows Speech Runtime Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58716
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Speech Runtime Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Microsoft Windows Speech allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

This vulnerability could lead to a contained execution environment escape. Please refer to AppContainer Isolation for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58716
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58716 Anonymous


CVE-2025-58717 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58717
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability?

Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58717
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Information Disclosure 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Information Disclosure 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Information Disclosure 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Information Disclosure 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Information Disclosure 5065468
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Information Disclosure 5065468
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Information Disclosure 5065509
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Information Disclosure 5065509
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Information Disclosure 5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Information Disclosure 5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58717 Anonymous


CVE-2025-58719 - Windows Connected Devices Platform Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58719
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metrics, successful exploitation of this vulnerability does not impact confidentiality (C:N), or integrity (I:N), but has a high impact on availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability cannot access or modify any sensitive user data but can cause user data to become unavailable.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58719
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58719 Zhang WangJunJie, He YiSheng with Hillstone Networks Security Research Institute


CVE-2025-58722 - Microsoft DWM Core Library Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58722
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows DWM allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58722
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58722 Varun Goel


Samuel Pope with MSRC


CVE-2025-58728 - Windows Bluetooth Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58728
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Bluetooth Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58728
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58728 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-58732 - Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58732
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58732
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Remote Code Execution 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Remote Code Execution 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Remote Code Execution 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58732 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-58735 - Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58735
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58735
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Remote Code Execution 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Remote Code Execution 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Remote Code Execution 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58735 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-59185 - NTLM Hash Disclosure Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59185
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NTLM Hash Disclosure Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user interacting with the file in multiple ways will cause the NTLM hash to be leaked. A few interactions which trigger this leak include:

  • Opening the parent folder in Explorer
  • Clicking the file (any mouse button)
  • Dragging the file
  • Deleting the file

Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59185
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Spoofing 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Spoofing 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Spoofing
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Spoofing
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Spoofing Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Spoofing Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Spoofing 5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Spoofing 5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Spoofing 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Spoofing 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Spoofing 5065425
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Spoofing
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Spoofing
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59185 Nacl


CVE-2025-59186 - Windows Kernel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59186
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59186
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59186 Lewis Lee, Ver and Zhiniang Peng of HUST


CVE-2025-59195 - Microsoft Graphics Component Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59195
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Graphics Component Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to deny service locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59195
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Denial of Service 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Denial of Service 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Denial of Service 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Denial of Service 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Denial of Service 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Denial of Service 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Denial of Service 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Denial of Service
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Denial of Service
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59195 cyanbamboo


CVE-2025-59196 - Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59196
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Simple Search and Discovery Protocol (SSDP) Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SSDP Service allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59196
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59196 k0shl with Kunlun Lab


CVE-2025-59199 - Software Protection Platform (SPP) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59199
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Software Protection Platform (SPP) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Software Protection Platform (SPP) allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could elevate from a low integrity level up to a medium integrity level.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59199
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59199 Yarin Aharoni with SafeBreach


CVE-2025-59200 - Data Sharing Service Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59200
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Data Sharing Service Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.7/TemporalScore:6.7
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityHigh
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Data Sharing Service Client allows an unauthorized attacker to perform spoofing locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click a specially crafted button for the attacker to successfully exploit the vulnerability.


According to the CVSS metric, successful exploitation could lead to some loss of availability and confidentiality and a total loss of integrity. What does that mean for the vulnerability?

Successful exploitation of this vulnerability enables an attacker to access data and disrupt services at a medium integrity level, resulting in some loss of confidentiality and availability. However, because the attacker can execute arbitrary code at that level, the vulnerability poses a total loss of integrity, allowing for potentially significant data manipulation.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59200
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Spoofing 5065430
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Spoofing 5065430
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Spoofing 5065427
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Spoofing 5065427
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Spoofing 5065428
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Spoofing 5065428
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Spoofing
5065426
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Spoofing
5065426
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Spoofing Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Spoofing Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Spoofing 5065427
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Spoofing 5065427
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Spoofing 5065428
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Spoofing 5065428
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Spoofing 5065432
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Spoofing 5065432
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Spoofing 5065425
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Spoofing
5065426
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Spoofing
5065426
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59200 Ron Benyizhak with Safebreach


CVE-2025-59201 - Network Connection Status Indicator (NCSI) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59201
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Network Connection Status Indicator (NCSI) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Network Connection Status Indicator (NCSI) allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could execute code in the security context of the “NT AUTHORITY\Network Service” account.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59201
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59201 T0


CVE-2025-59202 - Windows Remote Desktop Services Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59202
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Remote Desktop Services allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59202
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59202 k0shl with Kunlun Lab


CVE-2025-59204 - Windows Management Services Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59204
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Management Services Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Management Services allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59204
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59204 Taewoo (Tae_ω02)


CVE-2025-59206 - Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59206
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59206
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59206 Taewoo (Tae_ω02)


CVE-2025-59207 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59207
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59207
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59207 ChenJian with Sea Security Orca Team


CVE-2025-59211 - Windows Push Notification Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59211
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Push Notification Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59211
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Information Disclosure 5065509
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Information Disclosure 5065509
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Information Disclosure 5065507
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Information Disclosure 5065507
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59211 Anonymous


CVE-2025-59228 - Microsoft SharePoint Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59228
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability?

The attack vector is Network (AV:N) because this vulnerability is remotely exploitable and can be exploited from the internet. The attack complexity is Low (AC:L) because an attacker does not require significant prior knowledge of the system and can achieve repeatable success with the payload against the vulnerable component.


I am running SharePoint Server 2016. Do the updates for SharePoint Enterprise Server 2016 also apply to the version I am running?

Yes. The same KB number applies to both SharePoint Server 2016 and SharePoint Enterprise Server 2016. Customers running either version should install the security update to be protected from this vulnerability.


How could an attacker exploit the vulnerability?

In a network-based attack, an authenticated attacker, who has a minimum of Site Member permissions (PR:L), could execute code remotely on the SharePoint Server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59228
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002788 (Security Update) Important Remote Code Execution 5002778
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft SharePoint Server 2019 5002796 (Security Update) Important Remote Code Execution 5002775
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20059
Maybe None
Microsoft SharePoint Server Subscription Edition 5002786 (Security Update) Important Remote Code Execution 5002784
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.19127.20262
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59228 None

CVE-2025-59231 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59231
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59231
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002794 (Security Update) Important Remote Code Execution 5002782
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002794 (Security Update) Important Remote Code Execution 5002782
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Office Online Server 5002797 (Security Update) Important Remote Code Execution 5002776
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20059
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59231  Anonymous 


CVE-2025-59233 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59233
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59233
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002794 (Security Update) Important Remote Code Execution 5002782
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002794 (Security Update) Important Remote Code Execution 5002782
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Office Online Server 5002797 (Security Update) Important Remote Code Execution 5002776
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20059
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59233 None

CVE-2025-59234 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59234
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59234
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002792 (Security Update) Critical Remote Code Execution 5002781
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Office 2016 (64-bit edition) 5002792 (Security Update) Critical Remote Code Execution 5002781
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office for Android Release Notes (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.19328.20000
Maybe None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59234 None

CVE-2025-59235 - Microsoft Excel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59235
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59235
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Access 2016 (32-bit edition) 5002720 (Security Update) Important Information Disclosure 5002701
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Access 2016 (64-bit edition) 5002720 (Security Update) Important Information Disclosure 5002701
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Excel 2016 (32-bit edition) 5002794 (Security Update)
5002719 (Security Update)
5002757 (Security Update)
5002341 (Security Update)
Important Information Disclosure 5002782

5002588
5002734
5002052
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002794 (Security Update)
5002719 (Security Update)
5002757 (Security Update)
5002341 (Security Update)
Important Information Disclosure 5002782

5002588
5002734
5002052
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft SharePoint Enterprise Server 2016 5002788 (Security Update) Important Information Disclosure 5002778
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft SharePoint Server 2019 5002796 (Security Update) Important Information Disclosure 5002775
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.0.10417.20059
Maybe None
Office Online Server 5002797 (Security Update) Important Information Disclosure 5002776
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.0.10417.20059
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59235 Nathan Shomber of Microsoft


CVE-2025-59236 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59236
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59236
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Critical Remote Code Execution Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Office Online Server 5002797 (Security Update) Critical Remote Code Execution 5002776
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20059
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59236 Nathan Shomber of Microsoft


CVE-2025-59237 - Microsoft SharePoint Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59237
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.


FAQ:

How could an attacker exploit the vulnerability?

In a network-based attack, an attacker authenticated as at least a Site Owner, could write arbitrary code to inject and execute code remotely on the SharePoint Server.


I am running SharePoint Server 2016. Do the updates for SharePoint Enterprise Server 2016 also apply to the version I am running?

Yes. The same KB number applies to both SharePoint Server 2016 and SharePoint Enterprise Server 2016. Customers running either version should install the security update to be protected from this vulnerability.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59237
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002788 (Security Update) Important Remote Code Execution 5002778
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft SharePoint Server 2019 5002796 (Security Update) Important Remote Code Execution 5002775
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20059
Maybe None
Microsoft SharePoint Server Subscription Edition 5002786 (Security Update) Important Remote Code Execution 5002784
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.19127.20262
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59237 None

CVE-2025-59242 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59242
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59242
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59242 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-49708 - Microsoft Graphics Component Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49708
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Graphics Component Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.9/TemporalScore:8.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges over a network.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


How could an attacker exploit this vulnerability?

An attacker can exploit this vulnerability by getting access to the local guest VM so they can attack the Host OS.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

Compromising the host enables an attacker to impact other virtual machines running on the same host, even if those VMs are not directly vulnerable to this issue.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49708
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Critical Elevation of Privilege 5065428
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Critical Elevation of Privilege 5065428
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Critical Elevation of Privilege 5065429
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Critical Elevation of Privilege 5065429
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Critical Elevation of Privilege 5065429
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Critical Elevation of Privilege 5065429
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Critical Elevation of Privilege 5065429
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Critical Elevation of Privilege 5065429
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Critical Elevation of Privilege 5065431
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Critical Elevation of Privilege 5065431
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Critical Elevation of Privilege 5065431
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Critical Elevation of Privilege 5065431
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Critical Elevation of Privilege 5065426
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Critical Elevation of Privilege 5065426
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Critical Elevation of Privilege Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Critical Elevation of Privilege Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Critical Elevation of Privilege 5065428
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Critical Elevation of Privilege 5065428
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Critical Elevation of Privilege 5065432
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Critical Elevation of Privilege 5065432
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Critical Elevation of Privilege 5065425
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Critical Elevation of Privilege 5065426
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Critical Elevation of Privilege 5065426
Base: 9.9
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49708 None

CVE-2025-59243 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59243
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59243
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59243 4n0nym4u5 with Zscaler


CVE-2025-59249 - Microsoft Exchange Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59249
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Weak authentication in Microsoft Exchange Server allows an authorized attacker to elevate privileges over a network.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would be able to take over the mailboxes of all Exchange users, attackers can send emails, read emails, download attachments.


How could an attacker exploit this vulnerability?

An attacker would first have to compromise with a user account who is member of an admin group to run the required code.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59249
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5066369 (Security Update) Important Elevation of Privilege 5063223
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.01.2507.061
Yes None
Microsoft Exchange Server 2019 Cumulative Update 14 5066368 (Security Update) Important Elevation of Privilege 5063222
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1544.036
Yes None
Microsoft Exchange Server 2019 Cumulative Update 15 5066367 (Security Update) Important Elevation of Privilege 5063221
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1748.039
Yes None
Microsoft Exchange Server Subscription Edition RTM 5066366 (Security Update) Important Elevation of Privilege 5063224
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.2562.029
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59249 None

CVE-2025-59250 - JDBC Driver for SQL Server Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59250
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: JDBC Driver for SQL Server Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in JDBC Driver for SQL Server allows an unauthorized attacker to perform spoofing over a network.


FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking a victim into connecting to a malicious server using techniques like DNS poisoning or phishing. Once connected, the attacker presents a legitimate TLS certificate with a spoofed Common Name (CN) in the Organizational Unit (OU) field. The JDBC driver mistakenly trusts this certificate, allowing the attacker to intercept SQL credentials and perform a machine-in-the-middle attack on encrypted database traffic.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59250
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft JDBC Driver 10.2 for SQL Server Release Notes (Security Update) Important Spoofing Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.2.4
No None
Microsoft JDBC Driver 11.2 for SQL Server Release Notes (Security Update) Important Spoofing Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
11.2.4
No None
Microsoft JDBC Driver 12.10 for SQL Server Release Notes (Security Update) Important Spoofing Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
12.10.2
No None
Microsoft JDBC Driver 12.2 for SQL Server Release Notes (Security Update) Important Spoofing Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
12.2.1
No None
Microsoft JDBC Driver 12.4 for SQL Server Release Notes (Security Update) Important Spoofing Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
12.4.3
No None
Microsoft JDBC Driver 12.6 for SQL Server Release Notes (Security Update) Important Spoofing Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
12.6.5
No None
Microsoft JDBC Driver 12.8 for SQL Server Release Notes (Security Update) Important Spoofing Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
12.8.2
No None
Microsoft JDBC Driver 13.2 for SQL Server Release Notes (Security Update) Important Spoofing Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
13.2.1
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59250 None

CVE-2025-59254 - Microsoft DWM Core Library Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59254
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59254
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59254 namnp with Viettel Cyber Security


CVE-2025-59255 - Windows DWM Core Library Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59255
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59255
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59255 namnp with Viettel Cyber Security


CVE-2025-54957 - MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-54957
MITRE
NVD

Issuing CNA: MITRE

CVE Title: MITRE CVE-2025-54957: Integer overflow in Dolby Digital Plus audio decoder
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Deserialization of untrusted data in Microsoft Windows Codecs Library allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-54957
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Remote Code Execution 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-54957 Dolby Laboratories working with the original identifiers Ivan Fratric and Natalie Silvanovich of Google Project Zero


CVE-2025-59257 - Windows Local Session Manager (LSM) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59257
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Local Session Manager (LSM) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59257
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Denial of Service 5065425
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Denial of Service 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Denial of Service 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59257 Hussein Alrubaye with Microsoft


CVE-2025-59258 - Windows Active Directory Federation Services (ADFS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59258
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Active Directory Federation Services (ADFS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.2/TemporalScore:5.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Insertion of sensitive information into log file in Active Directory Federation Services allows an unauthorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could obtain Single Sign-On (SSO) cookies in ADFS logs.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59258
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5066875 (Monthly Rollup) Important Information Disclosure 5065509
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Information Disclosure 5065509
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Information Disclosure 5065507
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Information Disclosure 5065507
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure 5065426
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure 5065426
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59258 Anonymous


CVE-2025-59259 - Windows Local Session Manager (LSM) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59259
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Local Session Manager (LSM) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59259
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Denial of Service 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Denial of Service 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Denial of Service 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Denial of Service 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Denial of Service 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Denial of Service 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Denial of Service 5065509
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Denial of Service 5065509
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Denial of Service 5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Denial of Service 5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Denial of Service 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Denial of Service 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Denial of Service 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Denial of Service 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Denial of Service 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Denial of Service 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Denial of Service 5065425
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Denial of Service 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Denial of Service 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59259 Hussein Alrubaye with Microsoft


CVE-2025-59277 - Windows Authentication Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59277
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Authentication Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.


FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59277
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59277 k0shl with Kunlun Lab


CVE-2025-59280 - Windows SMB Client Tampering Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59280
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows SMB Client Tampering Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:3.1/TemporalScore:2.7
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper authentication in Windows SMB Client allows an unauthorized attacker to perform tampering over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability?

Data Tampering when connecting to a SMB2 Server which doesn't support SMB Multi-protocol negotiate.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Tampering

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59280
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Tampering 5065430
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Tampering 5065430
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Tampering 5065427
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Tampering 5065427
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Tampering 5065428
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Tampering 5065428
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Tampering 5065429
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Tampering 5065429
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Tampering 5065429
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Tampering 5065429
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Tampering 5065429
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Tampering 5065429
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Tampering 5065431
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Tampering 5065431
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Tampering 5065431
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Tampering 5065431
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Tampering 5065426
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Tampering 5065426
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Tampering 5065508
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Tampering 5065508
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Tampering 5065508
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Tampering 5065508
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Tampering 5065468
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Tampering 5065468
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Tampering 5065509
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Tampering 5065509
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Tampering 5065507
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Tampering 5065507
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Tampering 5065427
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Tampering 5065427
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Tampering 5065428
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Tampering 5065428
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Tampering 5065432
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Tampering 5065432
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Tampering 5065425
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Tampering 5065426
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Tampering 5065426
Base: 3.1
Temporal: 2.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59280 Anonymous


CVE-2025-47979 - Microsoft Failover Cluster Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-47979
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Failover Cluster Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Insertion of sensitive information into log file in Windows Failover Cluster allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker that successfully exploited this vulnerability could recover any data that is put in the system logs on the Compute Instance including cleartext passwords.


What further actions should I take to protect my environment after applying the fix?

Even after applying the security update, residual sensitive information may still exist in system logs. We strongly recommend that administrator users change their passwords to mitigate any potential risk from previously exposed credentials.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-47979
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-47979 Anonymous


CVE-2025-54132 - GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram Tool

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-54132
MITRE
NVD

Issuing CNA: GitHub

CVE Title: GitHub CVE-2025-54132: Arbitrary Image Fetch in Mermaid Diagram Tool
CVSS:

CVSS:3.1 Highest BaseScore:4.4/TemporalScore:4.4
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:

Cursor is a code editor built for programming with AI. In versions below 1.3, Mermaid (which is used to render diagrams) allows embedding images which then get rendered by Cursor in the chat box. An attacker can use this to exfiltrate sensitive information to a third-party attacker controlled server through an image fetch after successfully performing a prompt injection. A malicious model (or hallucination/backdoor) might also trigger this exploit at will. This issue requires prompt injection from malicious data (web, image upload, source code) to be exploited. In that case, it can send sensitive information to an attacker-controlled external server.

GitHub created this CVE on their behalf. The documented Visual Studio updates incorporate updates in Mermaid which address this vulnerability. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-54132
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Visual Studio 2022 version 17.14 Release Notes (Security Update) Important Information Disclosure Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
17.14.17
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-54132 None

CVE-2025-59281 - Xbox Gaming Services Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59281
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Xbox Gaming Services Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper link resolution before file access ('link following') in XBox Gaming Services allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker would be able to delete targeted files on a system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59281
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Xbox Gaming Services Store (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
31.105.17001.0
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59281 Dominic Littlewood


CVE-2025-59282 - Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59282
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Internet Information Services (IIS) Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Inbox COM Objects allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation:

Customers who have not enabled Internet Information Services (IIS) are not vulnerable to this attack.


Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59282
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Remote Code Execution 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Remote Code Execution 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Remote Code Execution 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59282 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-59284 - Windows NTLM Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59284
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTLM Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:3.3/TemporalScore:2.9
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59284
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 3.3
Temporal: 2.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 3.3
Temporal: 2.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 3.3
Temporal: 2.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 3.3
Temporal: 2.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Spoofing 5065426
Base: 3.3
Temporal: 2.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Spoofing 5065426
Base: 3.3
Temporal: 2.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Spoofing Base: 3.3
Temporal: 2.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Spoofing Base: 3.3
Temporal: 2.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Spoofing 5065426
Base: 3.3
Temporal: 2.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Spoofing 5065426
Base: 3.3
Temporal: 2.9
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59284 lyntc and _ozb_ working with Trend Zero Day Initiative


Len Sadowski and Oguz Bektas with Trend Zero Day Initiative


CVE-2025-11212 - Chromium: CVE-2025-11212 Inappropriate implementation in Media

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11212
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-11212 Inappropriate implementation in Media
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
141.0.3537.57 10/2/2025 141.0.7390.55

Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11212
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
141.0.3537.57
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11212 None

CVE-2025-11211 - Chromium: CVE-2025-11211 Out of bounds read in Media

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11211
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-11211 Out of bounds read in Media
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
141.0.3537.57 10/2/2025 141.0.7390.55

Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11211
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
141.0.3537.57
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11211 None

CVE-2025-11209 - Chromium: CVE-2025-11209 Inappropriate implementation in Omnibox

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11209
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-11209 Inappropriate implementation in Omnibox
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
141.0.3537.57 10/2/2025 141.0.7390.55

Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11209
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
141.0.3537.57
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11209 None

CVE-2025-11205 - Chromium: CVE-2025-11205 Heap buffer overflow in WebGPU

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11205
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-11205 Heap buffer overflow in WebGPU
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
141.0.3537.57 10/2/2025 141.0.7390.55

Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11205
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
141.0.3537.57
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11205 None

CVE-2025-59288 - Playwright Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59288
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Playwright Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.9
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Report ConfidenceConfirmed

Executive Summary:

Improper verification of cryptographic signature in GitHub allows an unauthorized attacker to perform spoofing over an adjacent network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack.


According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability?

This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Moderate Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59288
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
microsoft/playwright Repo (Security Update) Moderate Spoofing Base: 5.3
Temporal: 4.9
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RC:C
1.55.1
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59288 Jonathan Leitschuh with Socket


CVE-2025-59290 - Windows Bluetooth Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59290
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Bluetooth Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published. This CVE was addressed by updates that were released in September 2025, but the CVE was inadvertently omitted from the September 2025 Security Updates. This is an informational change only. Customers who have already installed the September 2025 updates do not need to take any further action.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59290
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5065429 (Security Update) Important Elevation of Privilege 5063709
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5065429 (Security Update) Important Elevation of Privilege 5063709
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 21H2 for x64-based Systems 5065429 (Security Update) Important Elevation of Privilege 5063709
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5065429 (Security Update) Important Elevation of Privilege 5063709
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5065429 (Security Update) Important Elevation of Privilege 5063709
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 22H2 for x64-based Systems 5065429 (Security Update) Important Elevation of Privilege 5063709
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5065431 (Security Update) Important Elevation of Privilege 5063875
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5909
Yes None
Windows 11 Version 22H2 for x64-based Systems 5065431 (Security Update) Important Elevation of Privilege 5063875
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5909
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5065431 (Security Update) Important Elevation of Privilege 5063875
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5909
Yes None
Windows 11 Version 23H2 for x64-based Systems 5065431 (Security Update) Important Elevation of Privilege 5063875
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5909
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5065426 (Security Update)
5065474 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5063878

5064010
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6584

10.0.26100.6508
Yes None
Windows 11 Version 24H2 for x64-based Systems 5065426 (Security Update)
5065474 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5063878

5064010
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6584

10.0.26100.6508
Yes None
Windows Server 2022 5065432 (Security Update)
5065306 (Security Hotpatch Update)
Important Elevation of Privilege 5063880

5063812
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4171

10.0.20348.4106
Yes None
Windows Server 2022 (Server Core installation) 5065432 (Security Update)
5065306 (Security Hotpatch Update)
Important Elevation of Privilege 5063880

5063812
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4171

10.0.20348.4106
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5065425 (Security Update) Important Elevation of Privilege 5063899
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1849
Yes None
Windows Server 2025 5065426 (Security Update)
5065474 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5063878

5064010
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6584

10.0.26100.6508
Yes None
Windows Server 2025 (Server Core installation) 5065426 (Security Update)
5065474 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5063878

5064010
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6584

10.0.26100.6508
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59290 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-59291 - Confidential Azure Container Instances Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59291
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Confidential Azure Container Instances Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.


FAQ:

How could an attacker exploit this vulnerability?

An attacker could trick the system into mounting a malicious file share to a sensitive location, allowing them to run harmful code.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker could gain code execution within the confidential ACI sidecar container, escalating from host control to confidential containers.


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

A successful attack allows the container host to execute code in the targeted guest environment.


What actions need to be taken to mitigate this vulnerability?

To ensure secure and compliant use of Confidential virtual nodes on Azure Container Instances, customers must take the following actions:

1. Update Helm Charts

2. Regenerate CCE Policy

If you are using Confidential ACI or Confidential virtual nodes, you must regenerate your Confidential Compute Environment (CCE) policy with a minimum infrastructure fragment SVN of 4.

To do this:

1. Update the Azure CLI confcom extension to version 1.2.8 or later:

  •   	*az extension update --name confcomShow more lines*
    

Alternatively, you can manually set the infrastructure SVN using:

  •   		*--infrastructure-svn 4*
    

2. Regenerate the CCE policy using either an ARM template or YAML file, depending on your deployment method.

3. Update any dependent key release policies, such as those using x-ms-sevsnpvm-hostdata claim checks in a Managed HSM (mHSM) key release policy.

4. Re-deploy your workload to apply the updated policy and configuration.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59291
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Compute Gallery Critical Elevation of Privilege None Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59291 Microsoft Offensive Research & Security Engineering


CVE-2025-59292 - Azure Compute Gallery Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59292
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Compute Gallery Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

External control of file name or path in Confidential Azure Container Instances allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker could gain code execution within the confidential ACI sidecar container, escalating from host control to confidential containers.


How could an attacker exploit this vulnerability?

An attacker could trick the system into mounting a malicious file share to a sensitive location, allowing them to run harmful code.


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

A successful attack allows the container host to execute code in the targeted guest environment.


What actions need to be taken to mitigate this vulnerability?

To ensure secure and compliant use of Confidential virtual nodes on Azure Container Instances, customers must take the following actions:

1. Update Helm Charts

2. Regenerate CCE Policy

If you are using Confidential ACI or Confidential virtual nodes, you must regenerate your Confidential Compute Environment (CCE) policy with a minimum infrastructure fragment SVN of 4.

To do this:

1. Update the Azure CLI confcom extension to version 1.2.8 or later:

  •   	*az extension update --name confcomShow more lines*
    

Alternatively, you can manually set the infrastructure SVN using:

  •   		*--infrastructure-svn 4*
    

2. Regenerate the CCE policy using either an ARM template or YAML file, depending on your deployment method.

3. Update any dependent key release policies, such as those using x-ms-sevsnpvm-hostdata claim checks in a Managed HSM (mHSM) key release policy.

4. Re-deploy your workload to apply the updated policy and configuration.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59292
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Compute Gallery Critical Elevation of Privilege None Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59292 Microsoft Offensive Research & Security Engineering


CVE-2025-59294 - Windows Taskbar Live Preview Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59294
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Taskbar Live Preview Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:2.1/TemporalScore:1.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows Taskbar Live allows an unauthorized attacker to disclose information with a physical attack.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is secrets or privileged information belonging to the user of the affected application.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability?

An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability).


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user would need to physically access the device after the user has hovered over a taskbar preview and then locked the screen or put the device to sleep, potentially exposing the application window on the lock screen.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59294
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure 5065426
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure 5065426
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure 5065426
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure 5065426
Base: 2.1
Temporal: 1.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59294 Ludwig


Andrew Haigh with Aptean


PeterAS17 with https://www.peteras17.me/


Anthony Juanelli


CVE-2025-59295 - Windows URL Parsing Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59295
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows URL Parsing Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Internet Explorer allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click a specially crafted button for the attacker to successfully exploit the vulnerability.


According to the CVSS metric, the attack vector is network (AV:N) and user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a user to open a specially crafted file from the attacker to initiate remote code execution.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability within the Workstation Service component to cause arbitrary memory write or control flow hijacking, resulting in privilege escalation. This could potentially allow the attacker to execute code with elevated privileges, compromising the security of the system.


The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2?

While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms.

To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59295
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
5066840 (IE Cumulative)
Important Remote Code Execution 5065508

5065435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571

1.000
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
5066840 (IE Cumulative)
Important Remote Code Execution 5065508

5065435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571

1.000
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
5066840 (IE Cumulative)
Important Remote Code Execution 5065508

5065435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571

1.000
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
5066840 (IE Cumulative)
Important Remote Code Execution 5065508

5065435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571

1.000
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066840 (IE Cumulative)
5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065435

5065468
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.000

6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066840 (IE Cumulative)
5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065435

5065468
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.000

6.1.7601.27974
Yes None
Windows Server 2012 5066840 (IE Cumulative)
5066875 (Monthly Rollup)
Important Remote Code Execution 5065435

5065509
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.000

6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066840 (IE Cumulative)
5066875 (Monthly Rollup)
Important Remote Code Execution 5065435

5065509
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.000

6.2.9200.25722
Yes None
Windows Server 2012 R2 5066840 (IE Cumulative)
5066873 (Monthly Rollup)
Important Remote Code Execution 5065435

5065507
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.000

6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066840 (IE Cumulative)
5066873 (Monthly Rollup)
Important Remote Code Execution 5065435

5065507
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.000

6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Remote Code Execution 5065425
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59295 j00sean


CVE-2025-59494 - Azure Monitor Agent Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59494
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Monitor Agent Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

A successful exploitation of this vulnerability allows a regular user on an Arc-enabled VM to read any file on the system with NT SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59494
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Monitor Agent Release Notes (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.38.1.0
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59494 Michal Kamensky with Microsoft


CVE-2016-9535 - MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2016-9535
MITRE
NVD

Issuing CNA: MITRE

CVE Title: MITRE CVE-2016-9535: LibTIFF Heap Buffer Overflow Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.0/TemporalScore:4.0
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:

tif_predict.h and tif_predict.c in libtiff 4.0.6 have assertions that can lead to assertion failures in debug mode, or buffer overflows in release mode, when dealing with unusual tile size like YCbCr with subsampling. Reported as MSVR 35105, aka "Predictor heap-buffer-overflow."

MITRE created this CVE on their behalf. The documented Windows updates incorporate updates in LibTIFF which address this vulnerability. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2016-9535
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Critical Remote Code Execution 5065430
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Critical Remote Code Execution 5065430
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Critical Remote Code Execution 5065427
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Critical Remote Code Execution 5065427
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Critical Remote Code Execution 5065428
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Critical Remote Code Execution 5065428
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Critical Remote Code Execution 5065429
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Critical Remote Code Execution 5065429
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Critical Remote Code Execution 5065429
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Critical Remote Code Execution 5065429
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Critical Remote Code Execution 5065429
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Critical Remote Code Execution 5065429
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Critical Remote Code Execution 5065431
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Critical Remote Code Execution 5065431
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Critical Remote Code Execution 5065431
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Critical Remote Code Execution 5065431
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Critical Remote Code Execution 5065426
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Critical Remote Code Execution 5065426
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Critical Remote Code Execution Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Critical Remote Code Execution Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Critical Remote Code Execution 5065508
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Critical Remote Code Execution 5065508
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Critical Remote Code Execution 5065508
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Critical Remote Code Execution 5065508
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Critical Remote Code Execution 5065468
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Critical Remote Code Execution 5065468
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Critical Remote Code Execution 5065509
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Critical Remote Code Execution 5065509
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Critical Remote Code Execution 5065507
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Critical Remote Code Execution 5065507
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Critical Remote Code Execution 5065427
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Critical Remote Code Execution 5065427
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Critical Remote Code Execution 5065428
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Critical Remote Code Execution 5065428
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Critical Remote Code Execution 5065432
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Critical Remote Code Execution 5065432
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Critical Remote Code Execution 5065425
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Critical Remote Code Execution 5065426
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Critical Remote Code Execution 5065426
Base: 4.0
Temporal: 4.0
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2016-9535 Anonymous


CVE-2025-11460 - Chromium: CVE-2025-11460 Use after free in Storage

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11460
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-11460 Use after free in Storage
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
141.0.3537.71 10/9/2025 141.0.7390.65/.66

Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Oct-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11460
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
141.0.3537.71
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11460 None

CVE-2025-11458 - Chromium: CVE-2025-11458 Heap buffer overflow in Sync

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11458
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-11458 Heap buffer overflow in Sync
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
141.0.3537.71 10/9/2025 141.0.7390.65/.66

Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Oct-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11458
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
141.0.3537.71
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11458 None

CVE-2025-59502 - Remote Procedure Call Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59502
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published. This CVE was addressed by updates that were released in September 2025, but the CVE was inadvertently omitted from the September 2025 Security Updates. This is an informational change only. Customers who have already installed the September 2025 updates do not need to take any further action.


Moderate Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59502
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5065428 (Security Update) Moderate Denial of Service 5063877
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7792
Yes None
Windows 10 Version 1809 for x64-based Systems 5065428 (Security Update) Moderate Denial of Service 5063877
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7792
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5065429 (Security Update) Moderate Denial of Service 5063709
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5065429 (Security Update) Moderate Denial of Service 5063709
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 21H2 for x64-based Systems 5065429 (Security Update) Moderate Denial of Service 5063709
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5065429 (Security Update) Moderate Denial of Service 5063709
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5065429 (Security Update) Moderate Denial of Service 5063709
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 22H2 for x64-based Systems 5065429 (Security Update) Moderate Denial of Service 5063709
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5065431 (Security Update) Moderate Denial of Service 5063875
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5909
Yes None
Windows 11 Version 22H2 for x64-based Systems 5065431 (Security Update) Moderate Denial of Service 5063875
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5909
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5065431 (Security Update) Moderate Denial of Service 5063875
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5909
Yes None
Windows 11 Version 23H2 for x64-based Systems 5065431 (Security Update) Moderate Denial of Service 5063875
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.5909
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5065426 (Security Update)
5065474 (SecurityHotpatchUpdate)
Moderate Denial of Service 5063878

5064010
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6584

10.0.26100.6508
Yes None
Windows 11 Version 24H2 for x64-based Systems 5065426 (Security Update)
5065474 (SecurityHotpatchUpdate)
Moderate Denial of Service 5063878

5064010
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6584

10.0.26100.6508
Yes None
Windows Server 2019 5065428 (Security Update) Moderate Denial of Service 5063877
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7792
Yes None
Windows Server 2019 (Server Core installation) 5065428 (Security Update) Moderate Denial of Service 5063877
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7792
Yes None
Windows Server 2022 5065432 (Security Update)
5065306 (Security Hotpatch Update)
Moderate Denial of Service 5063880

5063812
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4171

10.0.20348.4106
Yes None
Windows Server 2022 (Server Core installation) 5065432 (Security Update)
5065306 (Security Hotpatch Update)
Moderate Denial of Service 5063880

5063812
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4171

10.0.20348.4106
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5065425 (Security Update) Moderate Denial of Service 5063899
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1849
Yes None
Windows Server 2025 5065426 (Security Update)
5065474 (SecurityHotpatchUpdate)
Moderate Denial of Service 5063878

5064010
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6584

10.0.26100.6508
Yes None
Windows Server 2025 (Server Core installation) 5065426 (Security Update)
5065474 (SecurityHotpatchUpdate)
Moderate Denial of Service 5063878

5064010
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6584

10.0.26100.6508
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59502 Or Yair with SafeBreach


CVE-2025-48813 - Virtual Secure Mode Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-48813
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Virtual Secure Mode Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.3/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of a key past its expiration date in Virtual Secure Mode allows an authorized attacker to perform spoofing locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-48813
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Spoofing 5065428
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Spoofing 5065428
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Spoofing
5065426
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Spoofing
5065426
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Spoofing Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Spoofing Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Spoofing 5065428
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Spoofing 5065428
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Spoofing 5065432
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Spoofing 5065432
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Spoofing 5065425
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Spoofing
5065426
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Spoofing
5065426
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-48813 None

CVE-2025-25004 - PowerShell Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25004
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: PowerShell Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Microsoft PowerShell allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could create, modify, or delete files in the security context of the "NT AUTHORITY\SYSTEM" account.


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authenticated attacker could place a malicious file in a specified custom module path and then wait for a user to run a privileged .NET application that starts a PowerShell session under NT AUTHORITY\SYSTEM privileges


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25004
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
PowerShell 7.4 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
7.4.13
Maybe None
PowerShell 7.5 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
7.5.4
Maybe None
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25004 Casper


tsuki


tsuki


CVE-2025-53717 - Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53717
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Reliance on untrusted inputs in a security decision in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges would an attacker gain by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could potentially leak data from the target enclave or execute code within the context of the target enclave.


Are there any additional steps that I need to follow to be protected from this vulnerability?

The changes to address this vulnerability updated Virtual Secure Mode components. The policy described in Guidance for blocking rollback of Virtualization-based Security (VBS) related security updates has been updated to account for the latest changes. If you deployed this policy, then you'll need to redeploy using the updated policy.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53717
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53717 Microsoft Offensive Research & Security Engineering


CVE-2025-50152 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50152
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows Kernel allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50152
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50152 Anonymous


CVE-2025-53150 - Windows Digital Media Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53150
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Digital Media Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could elevate from a low integrity level up to a medium integrity level.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53150
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53150 Jongseong Kim (nevul37) with Ajou University, and working at ENKI WhiteHat


Dongjun Kim (smlijun) with Ajou University, and working at ENKI WhiteHat


Seongheun Hong (seongheunh) with Ajou University


CVE-2025-50175 - Windows Digital Media Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-50175
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Digital Media Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could elevate from a low integrity level up to a medium integrity level.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-50175
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-50175 vipinkumar


CVE-2025-53139 - Windows Hello Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53139
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hello Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.7/TemporalScore:6.7
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Cleartext transmission of sensitive information in Windows Hello allows an unauthorized attacker to bypass a security feature locally.


FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass the Windows Hello Facial and Fingerprint Recognition security feature.

Where can I find more information about Windows Hello Face Authentication?

Please see Windows Hello Face Authentication and/or Windows Hello Fingerprint Authentication for updated details.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53139
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53139 Parag Mali with Microsoft


Parag Mali with Microsoft


Ceri Coburn with NetSPI


CVE-2025-53768 - Xbox IStorageService Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-53768
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Xbox IStorageService Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Xbox allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-53768
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-53768 R4nger with CyberKunLun & Zhiniang Peng with HUST


CVE-2025-55240 - Visual Studio Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55240
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Visual Studio Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Visual Studio allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authenticated attacker could place a malicious file on the path to the project directory and then wait for a user with admin privileges to create a Visual Studio project to gain elevated privileges.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55240
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.9.77
Maybe None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.52
Maybe None
Microsoft Visual Studio 2022 version 17.10 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.20
Maybe None
Microsoft Visual Studio 2022 version 17.12 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.12.13
Maybe None
Microsoft Visual Studio 2022 version 17.14 Release Notes (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.14.17
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55240 Polar Penguin


ycdxsb


CVE-2025-55248 - .NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55248
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.8/TemporalScore:4.2
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Inadequate encryption strength in .NET, .NET Framework, Visual Studio allows an authorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Personally Identifiable Information (PII).


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authorized attacker with read/write privileges must send a victim a malicious email, or share the link to a malicious email, and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55248
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 8.0 installed on Linux 5068331 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
8.0.21
Maybe None
.NET 8.0 installed on Mac OS 5068331 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
8.0.21
Maybe None
.NET 8.0 installed on Windows 5068331 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
8.0.21
Maybe None
.NET 9.0 installed on Linux 5068332 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
9.0.10
Maybe None
.NET 9.0 installed on Mac OS 5068332 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
9.0.10
Maybe None
.NET 9.0 installed on Windows 5068332 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
9.0.10
Maybe None
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 5066742 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2.0.50727.8981
Maybe None
Microsoft .NET Framework 2.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 5066742 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2.0.50727.8981
Maybe None
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for 32-bit Systems Service Pack 2 5066742 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2.0.50727.8981
Maybe None
Microsoft .NET Framework 3.0 Service Pack 2 on Windows Server 2008 for x64-based Systems Service Pack 2 5066742 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2.0.50727.8981
Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems 5066738 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.7.04137.03
Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems 5066738 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.7.04137.03
Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 5066738 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.7.04137.03
Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) 5066738 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.7.04137.03
Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems 5066738 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.02
Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems 5066738 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.02
Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems 5066746 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.04
Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems 5066746 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.04
Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems 5066746 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.04
Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems 5066747 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.04
Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems 5066747 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.04
Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems 5066747 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.04
Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 5066738 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.02
Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) 5066738 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.02
Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 5066743 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.04
Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) 5066743 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.04
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems 5066746 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09320.02
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems 5066746 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09320.02
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems 5066746 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09320.02
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems 5066747 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09320.02
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems 5066747 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09320.02
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems 5066747 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09320.02
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems 5066133 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09321.01
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems 5066133 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09321.01
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 23H2 for ARM64-based Systems 5066133 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09321.01
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 23H2 for x64-based Systems 5066133 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09321.01
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 24H2 for ARM64-based Systems 5066131 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09321.01
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 24H2 for x64-based Systems 5066131 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09321.01
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 25H2 for ARM64-based Systems 5066128 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09321.01
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 25H2 for x64-based Systems 5066128 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09321.01
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 5066743 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09320.02
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) 5066743 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09320.02
Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022, 23H2 Edition (Server Core installation) 5066129 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.1.09321.01
Maybe None
Microsoft .NET Framework 3.5 on Windows Server 2008 for 32-bit Systems Service Pack 2 5066742 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2.0.50727.8981
Maybe None
Microsoft .NET Framework 3.5 on Windows Server 2008 for x64-based Systems Service Pack 2 5066742 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2.0.50727.8981
Maybe None
Microsoft .NET Framework 3.5 on Windows Server 2012 5066740 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2.0.50727.8981
Maybe None
Microsoft .NET Framework 3.5 on Windows Server 2012 (Server Core installation) 5066740 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2.0.50727.8981
Maybe None
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 5066741 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2.0.50727.8981
Maybe None
Microsoft .NET Framework 3.5 on Windows Server 2012 R2 (Server Core installation) 5066741 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2.0.50727.8981
Maybe None
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066739 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2.0.50727.8981
Maybe None
Microsoft .NET Framework 3.5.1 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066739 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2.0.50727.8981
Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 5066742 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.7.04137.03
Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066742 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.7.04137.03
Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 5066742 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.7.04137.03
Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066742 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.7.04137.03
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066742 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.7.04137.03
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066742 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.7.04137.03
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 5066740 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.7.04137.06
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) 5066740 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.7.04137.06
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 5066741 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.7.04137.03
Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) 5066741 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.7.04137.03
Maybe None
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for 32-bit Systems 5066136 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.02
Maybe None
Microsoft .NET Framework 4.8 on Windows 10 Version 1607 for x64-based Systems 5066136 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.02
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066739 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.02
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066739 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.02
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 5066740 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.04
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) 5066740 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.04
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 5066741 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.04
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) 5066741 (Monthly Rollup) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.04
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2016 5066136 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.02
Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2016 (Server Core installation) 5066136 (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.8.04798.02
Maybe None
Microsoft Visual Studio 2022 version 17.10 Release Notes (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
17.10.20
Maybe None
Microsoft Visual Studio 2022 version 17.12 Release Notes (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
17.12.13
Maybe None
Microsoft Visual Studio 2022 version 17.14 Release Notes (Security Update) Important Information Disclosure Base: 4.8
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
17.14.17
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55248 None

CVE-2025-55326 - Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55326
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Connected Devices Platform Service (Cdpsvc) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Connected Devices Platform Service (Cdpsvc) allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, a remote unauthenticated attacker would need to send specially crafted traffic to a system with the "Nearby Sharing" feature enabled and to convince a user to take specific actions.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

In a web-based attack scenario, an attacker could host a website or server that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55326
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Remote Code Execution 5065425
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55326 Azure Yang with Kunlun Lab


CVE-2025-55328 - Windows Hyper-V Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55328
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55328
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55328 hazard


CVE-2025-55330 - Windows BitLocker Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55330
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows BitLocker Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.


FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55330
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Security Feature Bypass 5065425
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55330 Alon Leviev with Microsoft (STORM)


Alon Leviev with Microsoft (STORM)


CVE-2025-55331 - Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55331
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55331
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55331 Taewoo (Tae_ω02)


CVE-2025-55332 - Windows BitLocker Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55332
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows BitLocker Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.


FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55332
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Security Feature Bypass 5065432
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Security Feature Bypass 5065432
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Security Feature Bypass 5065425
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55332 Alon Leviev with Microsoft (STORM)


Alon Leviev with Microsoft (STORM)


CVE-2025-55334 - Windows Kernel Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55334
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.2/TemporalScore:5.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Cleartext storage of sensitive information in Windows Kernel allows an unauthorized attacker to bypass a security feature locally.


FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could decrypt the driver's settings.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55334
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55334 Microsoft Offensive Research & Security Engineering


CVE-2025-55337 - Windows BitLocker Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55337
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows BitLocker Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.


FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55337
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55337 Alon Leviev with Microsoft (STORM)


CVE-2025-55678 - DirectX Graphics Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55678
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows DirectX allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55678
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55678 Anonymous


CVE-2025-55679 - Windows Kernel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55679
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.1/TemporalScore:4.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Windows Kernel allows an unauthorized attacker to disclose information locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55679
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55679 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-55680 - Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55680
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Time-of-check time-of-use (toctou) race condition in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55680
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55680 TyphoonPWN Windows PE Winner with SSD Secure Disclosure


CVE-2025-55682 - Windows BitLocker Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55682
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows BitLocker Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper enforcement of behavioral workflow in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.


FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55682
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Security Feature Bypass
5065426
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55682 Alon Leviev with Microsoft (STORM)


Alon Leviev with Microsoft (STORM)


CVE-2025-55683 - Windows Kernel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55683
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55683
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55683 Lewis Lee


CVE-2025-55684 - Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55684
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55684
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55684 Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat


Hwiwon Lee (hwiwonl), SEC-agent team


CVE-2025-55688 - Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55688
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55688
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55688 Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat


Hwiwon Lee (hwiwonl), SEC-agent team


CVE-2025-55690 - Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55690
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55690
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55690 Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat


Hwiwon Lee (hwiwonl), SEC-agent team


CVE-2025-55691 - Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55691
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55691
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55691 Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat


Hwiwon Lee (hwiwonl), SEC-agent team


CVE-2025-55692 - Windows Error Reporting Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55692
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Error Reporting Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Windows Error Reporting allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55692
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55692 Denis Faiustov with GMO Cybersecurity by Ierae


Ruslan Sayfiev with GMO Cybersecurity by Ierae


CVE-2025-55693 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55693
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Kernel allows an unauthorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-free vulnerability, even as a standard user.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55693
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55693 Anonymous


CVE-2025-55694 - Windows Error Reporting Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55694
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Error Reporting Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Windows Error Reporting allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55694
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55694 Denis Faiustov and Ruslan Sayfiev with GMO Cybersecurity by Ierae


CVE-2025-55695 - Windows WLAN AutoConfig Service Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55695
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows WLAN AutoConfig Service Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows WLAN Auto Config Service allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55695
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Information Disclosure 5065508
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Information Disclosure 5065508
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Information Disclosure 5065508
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Information Disclosure 5065508
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Information Disclosure 5065468
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Information Disclosure 5065468
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Information Disclosure 5065509
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Information Disclosure 5065509
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Information Disclosure 5065507
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Information Disclosure 5065507
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55695 RuiLun Zou with Codesafe Team of Legendsec at Qi'anxin Group


CVE-2025-55696 - NtQueryInformation Token function (ntifs.h) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55696
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NtQueryInformation Token function (ntifs.h) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Time-of-check time-of-use (toctou) race condition in NtQueryInformation Token function (ntifs.h) allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55696
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55696 Microsoft Offensive Research & Security Engineering


Microsoft Offensive Research & Security Engineering


CVE-2025-55697 - Azure Local Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55697
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Local Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Azure Local allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55697
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55697 Microsoft Offensive Research & Security Engineering (MORSE)


CVE-2025-55698 - DirectX Graphics Kernel Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55698
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DirectX Graphics Kernel Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.7/TemporalScore:6.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Null pointer dereference in Windows DirectX allows an authorized attacker to deny service over a network.


FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to cause denial of service on the Hyper-V host environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55698
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service
5065426
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service
5065426
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Denial of Service
5065426
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Denial of Service
5065426
Base: 7.7
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55698 cyanbamboo


CVE-2025-55699 - Windows Kernel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55699
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55699
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55699 Maxime Villard


CVE-2025-58714 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58714
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58714
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58714 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-58718 - Remote Desktop Client Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58718
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Desktop Client Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.


FAQ:

How would an attacker exploit this vulnerability?

An attacker would have to convince a targeted user to connect to a malicious RDP server. Upon connecting, the malicious server could execute code on the victim's system in the context of the targeted user.


Mitigations:

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation:

Port redirection must be enabled for this attack to be successful. This feature is disabled by default.


Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58718
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Remote Desktop client for Windows Desktop Release Notes (Security Update) Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.2.6599.0
Maybe None
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows App Client for Windows Desktop Release Notes (Security Update) Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.706.0
Maybe None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065468
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065468
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Remote Code Execution 5065509
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Remote Code Execution 5065509
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Remote Code Execution 5065425
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58718 YingQi Shi (@Mas0n) with DBAPPSecurity WeBin Lab


CVE-2025-58720 - Windows Cryptographic Services Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58720
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cryptographic Services Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is secrets or privileged information belonging to the user of the affected application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58720
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58720 Mitch Lindgren with Microsoft


CVE-2025-58724 - Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58724
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Azure Connected Machine Agent allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58724
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Arc Enabled Servers - Azure Connected Machine Agent Release Notes (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.56
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58724 Sharan Patil with REVERSEC


CVE-2025-58725 - Windows COM+ Event System Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58725
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows COM+ Event System Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows COM allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58725
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58725 Anonymous


CVE-2025-58726 - Windows SMB Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58726
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows SMB Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Windows SMB Server allows an authorized attacker to elevate privileges over a network.


FAQ:

How could an attacker exploit the vulnerability?

To exploit this vulnerability, an attacker could execute a specially crafted script to coerce the victim machine to connect back to the attacker’s SMB Server using SMB and authenticate. This could result in elevation of privilege.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

The Attack requires an SPN that is registered to an account that no longer exists or is not in use, to be on the target machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58726
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58726 Andrea Pierini with Semperis


CVE-2025-58727 - Windows Connected Devices Platform Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58727
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58727
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58727 Zhang WangJunJie, He YiSheng with Hillstone Networks Security Research Institute


CVE-2025-58729 - Windows Local Session Manager (LSM) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58729
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Local Session Manager (LSM) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper validation of specified type of input in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58729
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Denial of Service 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Denial of Service 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Denial of Service 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Denial of Service 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Denial of Service 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Denial of Service 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Denial of Service 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Denial of Service 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Denial of Service 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Denial of Service 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Denial of Service 5065468
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Denial of Service 5065468
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Denial of Service 5065509
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Denial of Service 5065509
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Denial of Service 5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Denial of Service 5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Denial of Service 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Denial of Service 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Denial of Service 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Denial of Service 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Denial of Service 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Denial of Service 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Denial of Service 5065425
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Denial of Service
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Denial of Service
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58729 Philemon Orphee Favrod


CVE-2025-58730 - Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58730
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58730
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Remote Code Execution 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Remote Code Execution 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Remote Code Execution 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58730 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-58731 - Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58731
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58731
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2022 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Remote Code Execution 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58731 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-58733 - Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58733
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58733
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Remote Code Execution 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Remote Code Execution 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Remote Code Execution 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58733 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-58734 - Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58734
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58734
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Remote Code Execution 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58734 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-58736 - Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58736
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58736
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Remote Code Execution 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Remote Code Execution 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Remote Code Execution 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Remote Code Execution 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Remote Code Execution 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58736 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-58737 - Remote Desktop Protocol Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58737
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Desktop Protocol Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Remote Desktop allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58737
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Remote Code Execution 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Remote Code Execution 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Remote Code Execution 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Remote Code Execution 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58737 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-58738 - Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58738
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58738
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Remote Code Execution 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Remote Code Execution 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Remote Code Execution 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Remote Code Execution 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Remote Code Execution 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Remote Code Execution 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Remote Code Execution
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58738 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-58739 - Microsoft Windows File Explorer Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-58739
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Windows File Explorer Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Successful exploitation of this vulnerability requires the user to view a specially crafted file in the Windows File Explorer Preview Pane.


The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2?

While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms.

To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-58739
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Spoofing 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Spoofing 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Spoofing
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Spoofing
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Spoofing Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Spoofing Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
5066840 (IE Cumulative)
Important Spoofing 5065508

5065435
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571

1.000
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
5066840 (IE Cumulative)
Important Spoofing 5065508

5065435
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571

1.000
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
5066840 (IE Cumulative)
Important Spoofing 5065508

5065435
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571

1.000
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
5066840 (IE Cumulative)
Important Spoofing 5065508

5065435
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571

1.000
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066840 (IE Cumulative)
5066872 (Monthly Rollup)
5066876 (Security Only)
Important Spoofing 5065435

5065468
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.000

6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066840 (IE Cumulative)
5066872 (Monthly Rollup)
5066876 (Security Only)
Important Spoofing 5065435

5065468
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.000

6.1.7601.27974
Yes None
Windows Server 2012 5066840 (IE Cumulative)
5066875 (Monthly Rollup)
Important Spoofing 5065435

5065509
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.000

6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066840 (IE Cumulative)
5066875 (Monthly Rollup)
Important Spoofing 5065435

5065509
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.000

6.2.9200.25722
Yes None
Windows Server 2012 R2 5066840 (IE Cumulative)
5066873 (Monthly Rollup)
Important Spoofing 5065435

5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.000

6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066840 (IE Cumulative)
5066873 (Monthly Rollup)
Important Spoofing 5065435

5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.000

6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Spoofing 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Spoofing 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Spoofing 5065425
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Spoofing
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Spoofing
5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-58739 01dGu0@whitecap100


Nacl


Novy@whitecap100


CVE-2025-59184 - Storage Spaces Direct Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59184
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Storage Spaces Direct Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows High Availability Services allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59184
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59184 Lewis Lee


CVE-2025-59187 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59187
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Windows Kernel allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59187
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59187 Anonymous


CVE-2025-59188 - Microsoft Failover Cluster Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59188
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Failover Cluster Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows Failover Cluster allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59188
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5066875 (Monthly Rollup) Important Information Disclosure 5065509
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Information Disclosure 5065509
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Information Disclosure 5065507
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Information Disclosure 5065507
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59188 Lewis Lee, Chunyang Han and Zhiniang Peng with HUST


CVE-2025-59189 - Microsoft Brokering File System Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59189
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Brokering File System allows an unauthorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to have a deep understanding of the system. Successful exploitation is not guaranteed and depends on a combination of factors that might include the environment, system configuration, and the presence of additional security measures.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59189
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59189 hazard


CVE-2025-59190 - Windows Search Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59190
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Search Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Microsoft Windows Search Component allows an unauthorized attacker to deny service locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to access a malicious folder or directory. Users should never open anything that they do not know or trust to be safe.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59190
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Denial of Service 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Denial of Service 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Denial of Service 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Denial of Service 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Denial of Service 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Denial of Service 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Denial of Service 5065508
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Denial of Service 5065508
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Denial of Service 5065508
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Denial of Service 5065508
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Denial of Service 5065468
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Denial of Service 5065468
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Denial of Service 5065509
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Denial of Service 5065509
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Denial of Service 5065507
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Denial of Service 5065507
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Denial of Service 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Denial of Service 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Denial of Service 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Denial of Service 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Denial of Service 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Denial of Service 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Denial of Service 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Denial of Service
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Denial of Service
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59190 Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat


Hwiwon Lee (hwiwonl), SEC-agent team


CVE-2025-59191 - Windows Connected Devices Platform Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59191
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Connected Devices Platform Service (Cdpsvc) allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59191
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59191 Zhang WangJunJie, He YiSheng with Hillstone Networks Security Research Institute


CVE-2025-59192 - Storport.sys Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59192
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Storport.sys Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Buffer over-read in Storport.sys Driver allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59192
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59192 zoemurmure with Qingteng


CVE-2025-59193 - Windows Management Services Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59193
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Management Services Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Management Services allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59193
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59193 Zhiniang Peng with HUST & R4nger with CyberKunLun


CVE-2025-59194 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59194
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Kernel allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-free vulnerability, even as a standard user.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59194
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59194 Muhammad Faathin Abdurrahman


CVE-2025-59197 - Windows ETL Channel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59197
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows ETL Channel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Insertion of sensitive information into log file in Windows ETL Channel allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the local memory address


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59197
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59197 Aobo Wang


CVE-2025-59198 - Windows Search Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59198
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Search Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.0/TemporalScore:4.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Microsoft Windows Search Component allows an authorized attacker to deny service locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability?

The vulnerability can be exploited by a regular user without admin rights, as long as they interact with a malicious file—such as running an executable. No elevated privileges are needed to trigger the issue.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59198
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Denial of Service 5065430
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Denial of Service 5065430
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Denial of Service 5065427
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Denial of Service 5065427
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Denial of Service 5065428
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Denial of Service 5065428
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service
5065426
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service
5065426
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Denial of Service 5065508
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Denial of Service 5065508
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Denial of Service 5065508
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Denial of Service 5065508
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Denial of Service 5065468
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Denial of Service 5065468
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Denial of Service 5065509
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Denial of Service 5065509
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Denial of Service 5065507
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Denial of Service 5065507
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Denial of Service 5065427
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Denial of Service 5065427
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Denial of Service 5065428
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Denial of Service 5065428
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Denial of Service 5065432
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Denial of Service 5065432
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Denial of Service 5065425
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Denial of Service
5065426
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Denial of Service
5065426
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59198 Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat


CVE-2025-59203 - Windows State Repository API Server File Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59203
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows State Repository API Server File Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Insertion of sensitive information into log file in Windows StateRepository API allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the local memory address


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59203
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59203 Aobo Wang


CVE-2025-59205 - Windows Graphics Component Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59205
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Graphics Component Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59205
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59205 wenqunwang with China Telecom Research Institute


CVE-2025-59208 - Windows MapUrlToZone Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59208
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows MapUrlToZone Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows MapUrlToZone allows an unauthorized attacker to disclose information over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to a high loss of confidentiality (C:H), and some loss of integrity (I:L) and no loss of availability (A:N). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could view sensitive information, (Confidentiality), and make some changes to disclosed information (Integrity), but they would not be able to affect Availability.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2?

While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms.

To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59208
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
5066840 (IE Cumulative)
Important Information Disclosure 5065508

5065435
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
6.0.6003.23571

1.000
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
5066840 (IE Cumulative)
Important Information Disclosure 5065508

5065435
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
6.0.6003.23571

1.000
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
5066840 (IE Cumulative)
Important Information Disclosure 5065508

5065435
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
6.0.6003.23571

1.000
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
5066840 (IE Cumulative)
Important Information Disclosure 5065508

5065435
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
6.0.6003.23571

1.000
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066840 (IE Cumulative)
5066872 (Monthly Rollup)
5066876 (Security Only)
Important Information Disclosure 5065435

5065468
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
1.000

6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066840 (IE Cumulative)
5066872 (Monthly Rollup)
5066876 (Security Only)
Important Information Disclosure 5065435

5065468
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
1.000

6.1.7601.27974
Yes None
Windows Server 2012 5066840 (IE Cumulative)
5066875 (Monthly Rollup)
Important Information Disclosure 5065435

5065509
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
1.000

6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066840 (IE Cumulative)
5066875 (Monthly Rollup)
Important Information Disclosure 5065435

5065509
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
1.000

6.2.9200.25722
Yes None
Windows Server 2012 R2 5066840 (IE Cumulative)
5066873 (Monthly Rollup)
Important Information Disclosure 5065435

5065507
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
1.000

6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066840 (IE Cumulative)
5066873 (Monthly Rollup)
Important Information Disclosure 5065435

5065507
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
1.000

6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59208 None

CVE-2025-59209 - Windows Push Notification Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59209
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Push Notification Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows Push Notification Core allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory addresses belonging to the "EventLog" Windows service


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59209
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Information Disclosure 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Information Disclosure 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Information Disclosure 5065509
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Information Disclosure 5065509
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Information Disclosure 5065507
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Information Disclosure 5065507
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59209 Aobo Wang


CVE-2025-59210 - Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59210
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Resilient File System (ReFS) Deduplication Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59210
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59210 Hwiwon Lee (hwiwonl), SEC-agent team


Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat


CVE-2025-59213 - Configuration Manager Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59213
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Configuration Manager Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an unauthorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An authorized attacker who successfully exploited this vulnerability could gain configuration manager administrator privileges.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by injecting malicious SQL into the DuplicateAMTMachineRecord method.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59213
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Configuration Manager 2403 Release Notes (Security Update) Important Elevation of Privilege Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
5.00.9128.1035
Maybe None
Microsoft Configuration Manager 2409 Release Notes (Security Update) Important Elevation of Privilege Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
5.00.9132.1029
Maybe None
Microsoft Configuration Manager 2503 Release Notes (Security Update) Important Elevation of Privilege Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
5.00.9135.1008
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59213 Mehdi Elyassa with Synacktiv


CVE-2025-59214 - Microsoft Windows File Explorer Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59214
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Windows File Explorer Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user would need to be tricked into opening a folder that contains a specially crafted file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59214
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Spoofing 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Spoofing 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Spoofing 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Spoofing 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Spoofing Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Spoofing Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Spoofing 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Spoofing 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Spoofing 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Spoofing 5065508
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Spoofing 5065468
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Spoofing 5065468
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Spoofing 5065509
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Spoofing 5065509
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Spoofing 5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Spoofing 5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Spoofing 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Spoofing 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Spoofing 5065425
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Spoofing 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Spoofing 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59214 Hemant Kumar


Ruben Enkaoua


Holl0w & https://www.linkedin.com/in/bartlomiejadamski/


CVE-2025-59221 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59221
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59221
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft SharePoint Enterprise Server 2016 5002788 (Security Update)
5002787 (Security Update)
Important Remote Code Execution 5002778

5002777
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft SharePoint Server 2019 5002796 (Security Update)
5002798 (Security Update)
Important Remote Code Execution 5002775

5002774
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20059
Maybe None
Microsoft Word 2016 (32-bit edition) 5002789 (Security Update) Important Remote Code Execution 5002780
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Word 2016 (64-bit edition) 5002789 (Security Update) Important Remote Code Execution 5002780
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59221 Haifei Li with EXPMON


CVE-2025-59222 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59222
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59222
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft SharePoint Enterprise Server 2016 5002788 (Security Update)
5002787 (Security Update)
Important Remote Code Execution 5002778

5002777
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft SharePoint Server 2019 5002796 (Security Update)
5002798 (Security Update)
Important Remote Code Execution 5002775

5002774
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20059
Maybe None
Microsoft Word 2016 (32-bit edition) 5002789 (Security Update) Important Remote Code Execution 5002780
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Word 2016 (64-bit edition) 5002789 (Security Update) Important Remote Code Execution 5002780
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59222 Haifei Li with EXPMON


CVE-2025-59223 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59223
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59223
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002794 (Security Update) Important Remote Code Execution 5002782
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002794 (Security Update) Important Remote Code Execution 5002782
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Office Online Server 5002797 (Security Update) Important Remote Code Execution 5002776
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20059
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59223 0x140ce


CVE-2025-59224 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59224
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59224
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002794 (Security Update) Important Remote Code Execution 5002782
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002794 (Security Update) Important Remote Code Execution 5002782
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Office Online Server 5002797 (Security Update) Important Remote Code Execution 5002776
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20059
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59224 Anonymous


Anonymous


CVE-2025-59225 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59225
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59225
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002794 (Security Update) Important Remote Code Execution 5002782
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002794 (Security Update) Important Remote Code Execution 5002782
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Office Online Server 5002797 (Security Update) Important Remote Code Execution 5002776
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20059
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59225 Quan Jin with DBAPPSecurity WeBin Lab


CVE-2025-59226 - Microsoft Office Visio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59226
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user would need to be tricked into opening a malicious file in Visio.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59226
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59226 4n0nym4u5 with Zscaler


CVE-2025-59227 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59227
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59227
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002792 (Security Update) Critical Remote Code Execution 5002781
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Office 2016 (64-bit edition) 5002792 (Security Update) Critical Remote Code Execution 5002781
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office for Android Release Notes (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.19328.20000
Maybe None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59227 None

CVE-2025-59229 - Microsoft Office Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59229
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncaught exception in Microsoft Office allows an unauthorized attacker to deny service locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59229
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Denial of Service Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Denial of Service Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Denial of Service Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Denial of Service Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59229 mose nilsson


moushi


CVE-2025-59232 - Microsoft Excel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59232
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59232
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Access 2016 (32-bit edition) 5002720 (Security Update) Important Information Disclosure 5002701
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Access 2016 (64-bit edition) 5002720 (Security Update) Important Information Disclosure 5002701
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Excel 2016 (32-bit edition) 5002794 (Security Update)
5002719 (Security Update)
5002757 (Security Update)
5002341 (Security Update)
Important Information Disclosure 5002782

5002588
5002734
5002052
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002794 (Security Update)
5002719 (Security Update)
5002757 (Security Update)
5002341 (Security Update)
Important Information Disclosure 5002782

5002588
5002734
5002052
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Information Disclosure Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.102.25101223
Maybe None
Microsoft SharePoint Enterprise Server 2016 5002788 (Security Update) Important Information Disclosure 5002778
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft SharePoint Server 2019 5002796 (Security Update) Important Information Disclosure 5002775
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.0.10417.20059
Maybe None
Office Online Server 5002797 (Security Update) Important Information Disclosure 5002776
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
16.0.10417.20059
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59232 Nathan Shomber of Microsoft


CVE-2025-59238 - Microsoft PowerPoint Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59238
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft PowerPoint Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59238
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft PowerPoint 2016 (32-bit edition) 5002790 (Security Update) Important Remote Code Execution 5002779
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None
Microsoft PowerPoint 2016 (64-bit edition) 5002790 (Security Update) Important Remote Code Execution 5002779
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5522.1000
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59238 None

CVE-2025-59241 - Windows Health and Optimized Experiences Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59241
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Health and Optimized Experiences Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper link resolution before file access ('link following') in Windows Health and Optimized Experiences Service allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59241
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege
5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26200.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59241 Filip Dragović


CVE-2025-2884 - Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-2884
MITRE
NVD

Issuing CNA: CERT/CC

CVE Title: Cert CC: CVE-2025-2884 Out-of-Bounds read vulnerability in TCG TPM2.0 reference implementation
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.6
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

CVE-2025-2884 is regarding a vulnerability in CG TPM2.0 Reference implementation's CryptHmacSign helper function that is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm.

CERT/CC created this CVE on their behalf. The documented Windows updates incorporate updates in CG TPM2.0 Reference implementation which address this vulnerability. Please see CVE-2025-2884 for more information.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely Yes No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-2884
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Information Disclosure 5065431
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Information Disclosure Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C
10.0.26200.6899
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C

10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure
5065426
Base: 5.3
Temporal: 4.6
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C

10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-2884 Anonymous


Anonymous


TCG [security@trustedcomputing.org] TCG


CVE-2025-59244 - NTLM Hash Disclosure Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59244
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NTLM Hash Disclosure Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

External control of file name or path in Windows Core Shell allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user interacting with the file in multiple ways will cause the NTLM hash to be leaked. A few interactions which trigger this leak include:

  • Opening the parent folder in Explorer
  • Clicking the file (any mouse button)
  • Dragging the file
  • Deleting the file

Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59244
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Spoofing 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Spoofing 5065430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Spoofing 5065429
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Spoofing 5065431
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Spoofing 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Spoofing 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Spoofing Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Spoofing Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Spoofing 5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Spoofing 5065507
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Spoofing 5065427
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Spoofing 5065428
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Spoofing 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Spoofing 5065432
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Spoofing 5065425
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Spoofing 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Spoofing 5065426
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59244 Nacl


CVE-2025-59248 - Microsoft Exchange Server Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59248
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59248
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5066369 (Security Update) Important Spoofing 5063223
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.01.2507.061
Yes None
Microsoft Exchange Server 2019 Cumulative Update 14 5066368 (Security Update) Important Spoofing 5063222
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.1544.036
Yes None
Microsoft Exchange Server 2019 Cumulative Update 15 5066367 (Security Update) Important Spoofing 5063221
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.1748.039
Yes None
Microsoft Exchange Server Subscription Edition RTM 5066366 (Security Update) Important Spoofing 5063224
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
15.02.2562.029
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59248 Anna Breeva with Breeva-X


CVE-2025-59230 - Windows Remote Access Connection Manager Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59230
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59230
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59230 Microsoft Threat Intelligence Center (MSTIC) & Microsoft Security Response Center (MSRC)




CVE-2025-59253 - Windows Search Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59253
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Search Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Microsoft Windows Search Component allows an authorized attacker to deny service locally.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59253
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Denial of Service 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Denial of Service 5065430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Denial of Service 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Denial of Service 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Denial of Service 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Denial of Service 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Denial of Service 5065429
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Denial of Service 5065431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Denial of Service Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Denial of Service Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Denial of Service 5065509
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Denial of Service 5065509
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Denial of Service 5065507
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Denial of Service 5065507
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Denial of Service 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Denial of Service 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Denial of Service 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Denial of Service 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Denial of Service 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Denial of Service 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Denial of Service 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Denial of Service 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Denial of Service 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59253 Remco van der Meer with Warpnet


CVE-2025-59260 - Microsoft Failover Cluster Virtual Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59260
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Failover Cluster Virtual Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Microsoft Failover Cluster Virtual Driver allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59260
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Information Disclosure 5065427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Information Disclosure 5065428
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Information Disclosure 5065432
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Information Disclosure 5065425
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Information Disclosure 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Information Disclosure 5065426
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59260 Lewis Lee, Chunyang Han and Zhiniang Peng with HUST


Chunyang Han


Lewis Lee, Chunyang Han and Zhiniang Peng with HUST


CVE-2025-59261 - Windows Graphics Component Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59261
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Graphics Component Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Time-of-check time-of-use (toctou) race condition in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59261
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59261 Maxime Villard


CVE-2025-59275 - Windows Authentication Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59275
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Authentication Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59275
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59275 k0shl with Kunlun Lab


CVE-2025-59278 - Windows Authentication Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59278
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Authentication Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper validation of specified type of input in Windows Authentication Methods allows an authorized attacker to elevate privileges locally.


FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59278
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Elevation of Privilege 5065430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Elevation of Privilege 5065429
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Elevation of Privilege 5065431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5066874 (Monthly Rollup)
5066877 (Security Only)
Important Elevation of Privilege 5065508
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23571
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5066872 (Monthly Rollup)
5066876 (Security Only)
Important Elevation of Privilege 5065468
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27974
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Elevation of Privilege 5065509
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Elevation of Privilege 5065507
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Elevation of Privilege 5065427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Elevation of Privilege 5065428
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Elevation of Privilege 5065432
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Elevation of Privilege 5065425
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Elevation of Privilege 5065426
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59278 k0shl with Kunlun Lab


CVE-2025-11215 - Chromium: CVE-2025-11215 Off by one error in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11215
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-11215 Off by one error in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
141.0.3537.57 10/2/2025 141.0.7390.55

Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11215
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
141.0.3537.57
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11215 None

CVE-2025-11216 - Chromium: CVE-2025-11216 Inappropriate implementation in Storage

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11216
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-11216 Inappropriate implementation in Storage
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
141.0.3537.57 10/2/2025 141.0.7390.55

Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11216
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
141.0.3537.57
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11216 None

CVE-2025-11213 - Chromium: CVE-2025-11213 Inappropriate implementation in Omnibox

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11213
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-11213 Inappropriate implementation in Omnibox
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
141.0.3537.57 10/2/2025 141.0.7390.55

Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11213
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
141.0.3537.57
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11213 None

CVE-2025-11210 - Chromium: CVE-2025-11210 Side-channel information leakage in Tab

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11210
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-11210 Side-channel information leakage in Tab
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
141.0.3537.57 10/2/2025 141.0.7390.55

Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11210
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
141.0.3537.57
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11210 None

CVE-2025-11207 - Chromium: CVE-2025-11207 Side-channel information leakage in Storage

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11207
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-11207 Side-channel information leakage in Storage
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
141.0.3537.57 10/2/2025 141.0.7390.55

Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11207
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
141.0.3537.57
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11207 None

CVE-2025-11208 - Chromium: CVE-2025-11208 Inappropriate implementation in Media

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11208
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-11208 Inappropriate implementation in Media
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
141.0.3537.57 10/2/2025 141.0.7390.55

Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11208
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
141.0.3537.57
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11208 None

CVE-2025-11206 - Chromium: CVE-2025-11206 Heap buffer overflow in Video

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11206
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-11206 Heap buffer overflow in Video
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
141.0.3537.57 10/2/2025 141.0.7390.55

Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11206
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
141.0.3537.57
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11206 None

CVE-2025-11219 - Chromium: CVE-2025-11219 Use after free in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11219
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2025-11219 Use after free in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
141.0.3537.57 10/2/2025 141.0.7390.55

Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11219
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
141.0.3537.57
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11219 None

CVE-2025-59285 - Azure Monitor Agent Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59285
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Monitor Agent Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Deserialization of untrusted data in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L) and the privilege required is none (PR:L). What privileges could an attacker gain with successful exploitation?

A local user could take advantage of this vulnerability and perform elevation of privilege (EOP). By successfully exploiting this vulnerability, the attacker could elevate their privileges to obtain root level access on the virtual machine.


According to the CVSS metric, the attack complexity is high (AC:H). What is does this mean in the context of the elevation of privilege vulnerability?

In order to successfully exploit this vulnerability, the attacker requires write access to the configuration directory by creating malicious files in a directory before the Azure Monitor Agent is installed or before the service starts after system restart.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59285
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Monitor Agent Release Notes (Security Update) Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.36.3
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59285 P1hcn


CVE-2025-59489 - MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59489
MITRE
NVD

Issuing CNA: MITRE

CVE Title: MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:8.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:

Unity announced a security vulnerability (CVE-2025-59489) that is affecting games or applications built with the Unity Gaming Engine Editor (version 2017.1 or later).

You may be using a Microsoft app or playing a Microsoft game that should be uninstalled until an update is available. We are working to update games and applications that are potentially affected by this Unity vulnerability.

In most cases, you can stay safe by ensuring your games and applications are up to date and Microsoft Defender is running on your device.

If you have downloaded a vulnerable game or app (see list below) on one of the following platforms, you could be at risk:

  • Android
  • Windows
  • Linux (Desktop)
  • Linux (embedded)
  • MacOS

We have confirmed the following are not impacted:

  • Xbox consoles
  • Xbox Cloud Gaming
  • iOS
  • HoloLens

Recommended Next Steps:

For Developers: Unity has made a fix available to developers. Organizations who believe that they have an app or game that might be impacted should reference Unity guidance and update their apps/games as soon as possible. You can learn more from Unity here.

For Players and Customers: Microsoft security and game development teams are working to update any game or application that is potentially affected by this Unity vulnerability.

If a Microsoft-owned game or application is not listed and you have installed all available updates, no further action is required. For customers who have automatic updates enabled, fixes will be deployed as they become available. If you have automatic updates turned off, please check to see if you have any updates available for your downloaded apps and games and install the latest update on your device.

Customers who have an impacted app or game installed (see below list) are encouraged to take these steps:

  • Temporarily uninstall any impacted Microsoft apps or games until an update is available. For more guidance on how to uninstall, please see the FAQs below.
  • Use an up-to-date version of Microsoft Defender to detect and block attempts to exploit this vulnerability.
  • Follow guidance from Unity or your platform provider.
  • Microsoft-owned games and apps affected by this vulnerability and their requisite updates are documented in the Security Updates Table.

For Microsoft Mesh Apps Users

In response to this CVE that is affecting applications built with the Unity Gaming Engine Editor (version 2017.1 or later), Microsoft has released a required security update for the Microsoft Mesh PC applications. We strongly encourage all users with the Microsoft Mesh apps installed on their devices to promptly update to the latest version of these apps, version 5.2513.3.0 or greater. If you have automatic updates enabled for these apps on all devices, no further action is required.

While we do not expect this to affect the functionality of any previously-scheduled events in Microsoft Mesh, use of the immersive spaces in Microsoft Teams meetings, or immersive events in Microsoft Teams, users will be required to update the Mesh PC apps before joining newly scheduled events in Mesh. We are informing you of this now so that you can mitigate any disruptions this may introduce to your events.


FAQ:

Why are there no links to updates in the Security Updates Table?

This document will be updated with more information as it becomes available. We recommend allowing automatic updates for the apps on your platform.

I am using an impacted game or app, what should I do?

You should uninstall the impacted application until an update is available. Updates are being released regularly, you can check this page to see if the impacted application has been removed from the “Updates in Progress” list above or check for available updates on your device. We also encourage customers to subscribe to Security Update Guide notifications to be alerted of updates for impacted games/apps. This Advisory and the related CVE will be updated with new information as needed and will link to any future security updates released.

How do I check for and install updates for my games or apps?

Windows customers can learn more here. If you are using another platform, please refer to their guidance.

How do I uninstall an impacted game or application?

To uninstall an app or game on Windows, press the Windows logo key on your keyboard or toolbar, and then enter settings in the search bar. Select Settings from the results, and then go to Apps > Apps & features or Installed apps, depending on your version of Windows. If you're on a Windows 10 device, choose the game that you want to uninstall from the list and then select Uninstall two times. On Windows 11, select the More actions button (“…”), and then select Uninstall two times. If you're on a Windows 10 device, choose the game that you want to uninstall from the list and then select Uninstall two times. On Windows 11, select the More actions button (“…”), and then select Uninstall two times.

How do I know if my game is impacted?

You can review the above list for impacted Microsoft titles. If the game you are playing is not listed and you have installed all available security updates, no further action is required. The above list is only representative of first-party Microsoft games.

I am playing one of the impacted games on Xbox console, should I be worried?

No. Console games and cloud gaming are not impacted.

Are there any games that were vulnerable but Microsoft has already released security updates for?

Yes, our teams have already released updates for some games and applications that were built on the effected version of Unity Editor. Those games and apps will be listed in the soon-to-be-published CVE-2025-59489.

When will updates be available for the games and apps that have not been updated?

Microsoft does not provide ETAs for security updates. Solutions to security issues are tested to ensure quality prior to release and will be published to the Microsoft Store once validation has been completed.

Are there any mitigations that can be deployed until a patch is available?

The game or app can be uninstalled and reinstalled once a patched version is available, please see MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability for the current status.

Additionally, Windows Defender will block exploitation attempts, Defender definitions version 1.437.296.0 and above have the following detections:

  • Exploit:Win32/CVE-2025-59489
  • Exploit:Win32/CVE-2025-59489.B
  • Behavior:Win32/CVE-2025-59489

Are handheld devices affected?

Devices running Windows are affected, including desktops, laptops and handheld devices.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03-Oct-25    

Information published.


2.0    07-Oct-25    

The following updates have been made to CVE-2025-59489: 1) In the Security Updates table, added Microsoft Mesh and Microsoft Mesh for Meta Quest as they affected by this vulnerability. 2) Further, to comprehensively address this vulnerability, Microsoft has released the 5.2514 build for these applications.

Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59489
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Avowed Artbook Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
DOOM (2019) Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
DOOM II (2019) Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
DOOM: Dark Ages Companion App Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Fallout Shelter Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Forza Customs Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Gears POP! Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Ghostwide Tokyo Prelude Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Grounded 2 Artbook Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Halo Recruit Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Hearthstone Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Knights and Bikes Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Microsoft Mesh for Meta Quest Release Notes (Security Update) Important Elevation of Privilege Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.2514
Maybe None
Microsoft Mesh PC Applications Release Notes (Security Update) Important Elevation of Privilege Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.2514
Maybe None
Mighty Doom Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Pillars of Eternity Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Pillars of Eternity II: Deadfire Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Pillars of Eternity II: Deadfire - Ultimate Edition Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Pillars of Eternity: Definitive Edition Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Pillars of Eternity: Hero Edition Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Starfield Companion App Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
The Bard's Tale Trilogy Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
The Elder Scrolls IV: Oblivion Remastered Companion App Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
The Elder Scrolls: Blades Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
The Elder Scrolls: Castles Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
The Elder Scrolls: Legends Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Warcraft Rumble Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Wasteland 3 Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Wasteland Remastered Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Zoo Tycoon Friends Important Elevation of Privilege None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59489 None

CVE-2025-59287 - Windows Server Update Service (WSUS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59287
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.


FAQ:

How could an attacker exploit this vulnerability?

A remote, unauthenticated attacker could send a crafted event that triggers unsafe object deserialization in a legacy serialization mechanism, resulting in remote code execution.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59287
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5066875 (Monthly Rollup) Critical Remote Code Execution 5065509
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Critical Remote Code Execution 5065509
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Critical Remote Code Execution 5065507
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Critical Remote Code Execution 5065507
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Critical Remote Code Execution 5065427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Critical Remote Code Execution 5065427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Critical Remote Code Execution 5065428
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Critical Remote Code Execution 5065428
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Critical Remote Code Execution 5065432
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Critical Remote Code Execution 5065432
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Critical Remote Code Execution 5065425
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Critical Remote Code Execution 5065426
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Critical Remote Code Execution 5065426
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59287 MEOW


CVE-2025-59289 - Windows Bluetooth Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59289
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Bluetooth Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Double free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published. This CVE was addressed by updates that were released in September 2025, but the CVE was inadvertently omitted from the September 2025 Security Updates. This is an informational change only. Customers who have already installed the September 2025 updates do not need to take any further action.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59289
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5065429 (Security Update) Important Elevation of Privilege 5063709
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5065429 (Security Update) Important Elevation of Privilege 5063709
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 21H2 for x64-based Systems 5065429 (Security Update) Important Elevation of Privilege 5063709
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5065429 (Security Update) Important Elevation of Privilege 5063709
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5065429 (Security Update) Important Elevation of Privilege 5063709
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 10 Version 22H2 for x64-based Systems 5065429 (Security Update) Important Elevation of Privilege 5063709
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.6332
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5065431 (Security Update) Important Elevation of Privilege 5063875
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5909
Yes None
Windows 11 Version 22H2 for x64-based Systems 5065431 (Security Update) Important Elevation of Privilege 5063875
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5909
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5065431 (Security Update) Important Elevation of Privilege 5063875
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5909
Yes None
Windows 11 Version 23H2 for x64-based Systems 5065431 (Security Update) Important Elevation of Privilege 5063875
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.5909
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5065426 (Security Update)
5065474 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5063878

5064010
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6584

10.0.26100.6508
Yes None
Windows 11 Version 24H2 for x64-based Systems 5065426 (Security Update)
5065474 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5063878

5064010
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6584

10.0.26100.6508
Yes None
Windows Server 2022 5065432 (Security Update)
5065306 (Security Hotpatch Update)
Important Elevation of Privilege 5063880

5063812
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4171

10.0.20348.4106
Yes None
Windows Server 2022 (Server Core installation) 5065432 (Security Update)
5065306 (Security Hotpatch Update)
Important Elevation of Privilege 5063880

5063812
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.4171

10.0.20348.4106
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5065425 (Security Update) Important Elevation of Privilege 5063899
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1849
Yes None
Windows Server 2025 5065426 (Security Update)
5065474 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5063878

5064010
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6584

10.0.26100.6508
Yes None
Windows Server 2025 (Server Core installation) 5065426 (Security Update)
5065474 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5063878

5064010
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.6584

10.0.26100.6508
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59289 Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat


Hwiwon Lee (hwiwonl), SEC-agent team


CVE-2025-47827 - MITRE CVE-2025-47827: Secure Boot bypass in IGEL OS before 11

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-47827
MITRE
NVD

Issuing CNA: MITRE

CVE Title: MITRE CVE-2025-47827: Secure Boot bypass in IGEL OS before 11
CVSS:

CVSS:3.1 Highest BaseScore:4.6/TemporalScore:4.3
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.

MITRE created this CVE on their behalf. The documented Windows updates incorporate updates in IGEL OS which address this vulnerability. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.


FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-47827
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5066837 (Security Update) Important Security Feature Bypass 5065430
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 for x64-based Systems 5066837 (Security Update) Important Security Feature Bypass 5065430
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.10240.21161
Yes None
Windows 10 Version 1607 for 32-bit Systems 5066836 (Security Update) Important Security Feature Bypass 5065427
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1607 for x64-based Systems 5066836 (Security Update) Important Security Feature Bypass 5065427
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.14393.8519
Yes None
Windows 10 Version 1809 for 32-bit Systems 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 1809 for x64-based Systems 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.17763.7919
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 21H2 for x64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.19044.6456
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 10 Version 22H2 for x64-based Systems 5066791 (Security Update) Important Security Feature Bypass 5065429
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.19045.6456
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 22H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.22621.6060
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 23H2 for x64-based Systems 5066793 (Security Update) Important Security Feature Bypass 5065431
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.22631.6060
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass 5065426
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 24H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass 5065426
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.26100.6899
Yes None
Windows 11 Version 25H2 for ARM64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C

10.0.26200.6899
Yes None
Windows 11 Version 25H2 for x64-based Systems 5066835 (Security Update) Important Security Feature Bypass Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C

10.0.26200.6899
Yes None
Windows Server 2012 5066875 (Monthly Rollup) Important Security Feature Bypass 5065509
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 (Server Core installation) 5066875 (Monthly Rollup) Important Security Feature Bypass 5065509
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
6.2.9200.25722
Yes None
Windows Server 2012 R2 5066873 (Monthly Rollup) Important Security Feature Bypass 5065507
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2012 R2 (Server Core installation) 5066873 (Monthly Rollup) Important Security Feature Bypass 5065507
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
6.3.9600.22824
Yes None
Windows Server 2016 5066836 (Security Update) Important Security Feature Bypass 5065427
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2016 (Server Core installation) 5066836 (Security Update) Important Security Feature Bypass 5065427
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.14393.8519
Yes None
Windows Server 2019 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2019 (Server Core installation) 5066586 (Security Update) Important Security Feature Bypass 5065428
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.17763.7919
Yes None
Windows Server 2022 5066782 (Security Update) Important Security Feature Bypass 5065432
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022 (Server Core installation) 5066782 (Security Update) Important Security Feature Bypass 5065432
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.20348.4294
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5066780 (Security Update) Important Security Feature Bypass 5065425
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.25398.1913
Yes None
Windows Server 2025 5066835 (Security Update) Important Security Feature Bypass 5065426
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.26100.6899
Yes None
Windows Server 2025 (Server Core installation) 5066835 (Security Update) Important Security Feature Bypass 5065426
Base: 4.6
Temporal: 4.3
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C
10.0.26100.6899
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-47827 None

CVE-2025-59497 - Microsoft Defender for Linux Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59497
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Defender for Linux Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Time-of-check time-of-use (toctou) race condition in Microsoft Defender for Linux allows an authorized attacker to deny service locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Oct-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59497
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Defender for Endpoint for Linux Release Notes (Security Update) Important Denial of Service Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
101.25032.0010
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59497 G1ND1L4


Gil Regev


CVE-2025-59218 - Azure Entra ID Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59218
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Entra ID Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.6/TemporalScore:8.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Azure Entra ID Elevation of Privilege Vulnerability


FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Oct-25    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59218
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Entra ID Critical Elevation of Privilege None Base: 9.6
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59218 Vladimir Abramzon


Vladimir Abramzon


CVE-2025-59246 - Azure Entra ID Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59246
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Entra ID Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Azure Entra ID Elevation of Privilege Vulnerability


FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Oct-25    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59246
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Entra ID Critical Elevation of Privilege None Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59246 Dylan Ryan-Zilavy


CVE-2025-59247 - Azure PlayFab Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59247
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure PlayFab Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Oct-25    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59247
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure PlayFab Critical Elevation of Privilege None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59247 Anonymous


CVE-2025-59252 - M365 Copilot Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59252
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: M365 Copilot Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Oct-25    

Information published.


Critical Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59252
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Word Copilot Critical Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59252 Estevam Arantes with Microsoft


CVE-2025-59271 - Redis Enterprise Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59271
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Redis Enterprise Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.7/TemporalScore:7.6
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Oct-25    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59271
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Cache for Redis Enterprise Critical Elevation of Privilege None Base: 8.7
Temporal: 7.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None
Azure Managed Redis Critical Elevation of Privilege None Base: 8.7
Temporal: 7.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59271 Chantal Olieman with Microsoft


Gary Wang with Microsoft


Jordan Rodak with Microsoft


CVE-2025-59272 - Copilot Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59272
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Copilot Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Oct-25    

Information published.


Critical Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59272
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Copilot's Business Chat Critical Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59272 Estevam Arantes with Microsoft


CVE-2025-55321 - Azure Monitor Log Analytics Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-55321
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Monitor Log Analytics Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.7/TemporalScore:7.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of input during web page generation ('cross-site scripting') in Azure Monitor allows an authorized attacker to perform spoofing over a network.


FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Oct-25    

Information published.


Critical Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-55321
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Monitor Critical Spoofing None Base: 8.7
Temporal: 7.6
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-55321 Arnaud PASCAL with VAADATA


Thomas DELFINO with VAADATA


CVE-2025-59286 - Copilot Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-59286
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Copilot Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Oct-25    

Information published.


Critical Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-59286
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Copilot's Business Chat Critical Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-59286 Estevam Arantes with Microsoft


CVE-2025-39895 - sched: Fix sched_numa_find_nth_cpu() if mask offline

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39895
MITRE
NVD

Issuing CNA: Linux

CVE Title: sched: Fix sched_numa_find_nth_cpu() if mask offline
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39895
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39895 None

CVE-2025-39934 - drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39934
MITRE
NVD

Issuing CNA: Linux

CVE Title: drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39934
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39934 None

CVE-2025-39929 - smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39929
MITRE
NVD

Issuing CNA: Linux

CVE Title: smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39929
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39929 None

CVE-2025-39938 - ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39938
MITRE
NVD

Issuing CNA: Linux

CVE Title: ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39938
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39938 None

CVE-2025-39942 - ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39942
MITRE
NVD

Issuing CNA: Linux

CVE Title: ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39942
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39942 None

CVE-2025-39946 - tls: make sure to abort the stream if headers are bogus

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39946
MITRE
NVD

Issuing CNA: Linux

CVE Title: tls: make sure to abort the stream if headers are bogus
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39946
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39946 None

CVE-2025-39943 - ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39943
MITRE
NVD

Issuing CNA: Linux

CVE Title: ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Critical Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39943
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Critical Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39943 None

CVE-2025-39951 - um: virtio_uml: Fix use-after-free after put_device in probe

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39951
MITRE
NVD

Issuing CNA: Linux

CVE Title: um: virtio_uml: Fix use-after-free after put_device in probe
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39951
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39951 None

CVE-2025-39937 - net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39937
MITRE
NVD

Issuing CNA: Linux

CVE Title: net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39937
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39937 None

CVE-2025-39932 - smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work)

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39932
MITRE
NVD

Issuing CNA: Linux

CVE Title: smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work)
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39932
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39932 None

CVE-2025-39949 - qed: Don't collect too many protection override GRC elements

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39949
MITRE
NVD

Issuing CNA: Linux

CVE Title: qed: Don't collect too many protection override GRC elements
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39949
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39949 None

CVE-2025-39945 - cnic: Fix use-after-free bugs in cnic_delete_task

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39945
MITRE
NVD

Issuing CNA: Linux

CVE Title: cnic: Fix use-after-free bugs in cnic_delete_task
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Important Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39945
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Important Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39945 None

CVE-2025-39933 - smb: client: let recv_done verify data_offset, data_length and remaining_data_length

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39933
MITRE
NVD

Issuing CNA: Linux

CVE Title: smb: client: let recv_done verify data_offset, data_length and remaining_data_length
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39933
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39933 None

CVE-2025-39931 - crypto: af_alg - Set merge to zero early in af_alg_sendmsg

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39931
MITRE
NVD

Issuing CNA: Linux

CVE Title: crypto: af_alg - Set merge to zero early in af_alg_sendmsg
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39931
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39931 None

CVE-2025-39947 - net/mlx5e: Harden uplink netdev access against device unbind

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39947
MITRE
NVD

Issuing CNA: Linux

CVE Title: net/mlx5e: Harden uplink netdev access against device unbind
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39947
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39947 None

CVE-2025-10728 - Uncontrolled recursion in Qt SVG module

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-10728
MITRE
NVD

Issuing CNA: TQtC

CVE Title: Uncontrolled recursion in Qt SVG module
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Oct-25    

Information published.


Important Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-10728
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 qtsvg 6.6.1-2 on Azure Linux 3.0 Important Unknown None Base: N/A
Temporal: N/A
Vector: N/A
Unknown Unknown None
cbl2 qt5-qtsvg 5.12.11-6 on CBL Mariner 2.0 Important Unknown None Base: N/A
Temporal: N/A
Vector: N/A
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-10728 None

CVE-2025-61985 - ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-61985
MITRE
NVD

Issuing CNA: mitre

CVE Title: ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.
CVSS:

CVSS:3.1 Highest BaseScore:4.5/TemporalScore:4.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Oct-25    

Information published.


Low Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-61985
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 openssh 9.8p1-4 on Azure Linux 3.0 Low Unknown None Base: 3.6
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Unknown Unknown None
cbl2 openssh 8.9p1-8 on CBL Mariner 2.0 CBL-Mariner Releases (Security Update) Moderate Unknown Base: 4.5
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:U
8.9p1-9
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-61985 None

CVE-2025-61984 - ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-61984
MITRE
NVD

Issuing CNA: mitre

CVE Title: ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
CVSS:

CVSS:3.1 Highest BaseScore:3.6/TemporalScore:3.6
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Oct-25    

Information published.


Low Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-61984
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 openssh 9.8p1-4 on Azure Linux 3.0 Low Unknown None Base: 3.6
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Unknown Unknown None
cbl2 openssh 8.9p1-8 on CBL Mariner 2.0 Low Unknown None Base: 3.6
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-61984 None

CVE-2025-39955 - tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39955
MITRE
NVD

Issuing CNA: Linux

CVE Title: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39955
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 7.1
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39955 None

CVE-2025-46819 - Redis is vulnerable to DoS via specially crafted LUA scripts

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-46819
MITRE
NVD

Issuing CNA: GitHub_M

CVE Title: Redis is vulnerable to DoS via specially crafted LUA scripts
CVSS:

CVSS:3.1 Highest BaseScore:6.3/TemporalScore:6.3
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-46819
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 ceph 18.2.2-10 on Azure Linux 3.0 Moderate Unknown None Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
Unknown Unknown None
azl3 valkey 8.0.4-1 on Azure Linux 3.0 CBL-Mariner Releases (Security Update) Moderate Unknown Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
8.0.6-1
No None
cbl2 ceph 16.2.10-9 on CBL Mariner 2.0 Moderate Unknown None Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
Unknown Unknown None
cbl2 redis 6.2.18-3 on CBL Mariner 2.0 Moderate Unknown None Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
Unknown Unknown None
cbl2 redis 6.2.20-1 on CBL Mariner 2.0 Moderate Unknown None Base: 6.3
Temporal: 6.3
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-46819 None

CVE-2025-11412 - GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11412
MITRE
NVD

Issuing CNA: VulDB

CVE Title: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
CVSS:

CVSS:3.1 Highest BaseScore:3.3/TemporalScore:3.0
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11412
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 binutils 2.41-7 on Azure Linux 3.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 binutils 2.37-16 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 binutils 2.37-17 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 gdb 11.2-6 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 gdb 11.2-7 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11412 None

CVE-2025-37727 - Elasticsearch Insertion of sensitive information in log file

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-37727
MITRE
NVD

Issuing CNA: elastic

CVE Title: Elasticsearch Insertion of sensitive information in log file
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.7
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-37727
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 rubygem-elasticsearch 8.9.0-1 on Azure Linux 3.0 Moderate Unknown None Base: 5.7
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Unknown Unknown None
cbl2 rubygem-elasticsearch 8.3.0-1 on CBL Mariner 2.0 Moderate Unknown None Base: 5.7
Temporal: 5.7
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-37727 None

CVE-2025-39927 - ceph: fix race condition validating r_parent before applying state

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39927
MITRE
NVD

Issuing CNA: Linux

CVE Title: ceph: fix race condition validating r_parent before applying state
CVSS:

CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39927
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39927 None

CVE-2025-39891 - wifi: mwifiex: Initialize the chan_stats array to zero

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39891
MITRE
NVD

Issuing CNA: Linux

CVE Title: wifi: mwifiex: Initialize the chan_stats array to zero
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39891
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39891 None

CVE-2025-39901 - i40e: remove read access to debugfs files

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39901
MITRE
NVD

Issuing CNA: Linux

CVE Title: i40e: remove read access to debugfs files
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Important Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39901
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Important Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39901 None

CVE-2025-39909 - mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39909
MITRE
NVD

Issuing CNA: Linux

CVE Title: mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39909
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39909 None

CVE-2025-39910 - mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39910
MITRE
NVD

Issuing CNA: Linux

CVE Title: mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Critical Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39910
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Critical Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39910 None

CVE-2025-39902 - mm/slub: avoid accessing metadata when pointer is invalid in object_err()

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39902
MITRE
NVD

Issuing CNA: Linux

CVE Title: mm/slub: avoid accessing metadata when pointer is invalid in object_err()
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39902
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39902 None

CVE-2025-39916 - mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39916
MITRE
NVD

Issuing CNA: Linux

CVE Title: mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39916
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39916 None

CVE-2025-39923 - dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39923
MITRE
NVD

Issuing CNA: Linux

CVE Title: dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39923
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39923 None

CVE-2025-39925 - can: j1939: implement NETDEV_UNREGISTER notification handler

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39925
MITRE
NVD

Issuing CNA: Linux

CVE Title: can: j1939: implement NETDEV_UNREGISTER notification handler
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Critical Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39925
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Critical Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39925 None

CVE-2025-39898 - e1000e: fix heap overflow in e1000_set_eeprom

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39898
MITRE
NVD

Issuing CNA: Linux

CVE Title: e1000e: fix heap overflow in e1000_set_eeprom
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Critical Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39898
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Critical Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39898 None

CVE-2025-39914 - tracing: Silence warning when chunk allocation fails in trace_pid_write

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39914
MITRE
NVD

Issuing CNA: Linux

CVE Title: tracing: Silence warning when chunk allocation fails in trace_pid_write
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39914
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39914 None

CVE-2023-53469 - af_unix: Fix null-ptr-deref in unix_stream_sendpage().

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-53469
MITRE
NVD

Issuing CNA: Linux

CVE Title: af_unix: Fix null-ptr-deref in unix_stream_sendpage().
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Important Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-53469
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Important Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-53469 None

CVE-2025-39905 - net: phylink: add lock for serializing concurrent pl->phydev writes with resolver

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39905
MITRE
NVD

Issuing CNA: Linux

CVE Title: net: phylink: add lock for serializing concurrent pl->phydev writes with resolver
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39905
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 7.1
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39905 None

CVE-2025-39911 - i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39911
MITRE
NVD

Issuing CNA: Linux

CVE Title: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path
CVSS:

CVSS:3.1 Highest BaseScore:3.3/TemporalScore:3.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Low Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39911
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Low Unknown None Base: 3.3
Temporal: 3.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39911 None

CVE-2025-39920 - pcmcia: Add error handling for add_interval() in do_validate_mem()

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39920
MITRE
NVD

Issuing CNA: Linux

CVE Title: pcmcia: Add error handling for add_interval() in do_validate_mem()
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39920
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39920 None

CVE-2025-39913 - tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39913
MITRE
NVD

Issuing CNA: Linux

CVE Title: tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39913
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 6.6
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39913 None

CVE-2025-39907 - mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39907
MITRE
NVD

Issuing CNA: Linux

CVE Title: mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Oct-25    

Information published.


Critical Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39907
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Critical Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39907 None

CVE-2025-39952 - wifi: wilc1000: avoid buffer overflow in WID string configuration

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39952
MITRE
NVD

Issuing CNA: Linux

CVE Title: wifi: wilc1000: avoid buffer overflow in WID string configuration
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Important Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39952
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Important Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39952 None

CVE-2025-39953 - cgroup: split cgroup_destroy_wq into 3 workqueues

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39953
MITRE
NVD

Issuing CNA: Linux

CVE Title: cgroup: split cgroup_destroy_wq into 3 workqueues
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39953
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39953 None

CVE-2025-39940 - dm-stripe: fix a possible integer overflow

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39940
MITRE
NVD

Issuing CNA: Linux

CVE Title: dm-stripe: fix a possible integer overflow
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.6
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39940
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 6.1
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H/E:U
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39940 None

CVE-2025-39944 - octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39944
MITRE
NVD

Issuing CNA: Linux

CVE Title: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Oct-25    

Information published.


Important Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39944
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Important Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39944 None

CVE-2022-50502 - mm: /proc/pid/smaps_rollup: fix no vma's null-deref

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-50502
MITRE
NVD

Issuing CNA: Linux

CVE Title: mm: /proc/pid/smaps_rollup: fix no vma's null-deref
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-50502
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-50502 None

CVE-2025-11234 - Qemu-kvm: vnc websocket handshake use-after-free

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11234
MITRE
NVD

Issuing CNA: redhat

CVE Title: Qemu-kvm: vnc websocket handshake use-after-free
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11234
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 qemu 8.2.0-19 on Azure Linux 3.0 Moderate Unknown None Base: 7.5
Temporal: 6.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U
Unknown Unknown None
cbl2 qemu 6.2.0-24 on CBL Mariner 2.0 Moderate Unknown None Base: 7.5
Temporal: 6.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11234 None

CVE-2025-10729 - Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-10729
MITRE
NVD

Issuing CNA: TQtC

CVE Title: Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG
CVSS:

CVSS:3.1 Highest BaseScore:9.3/TemporalScore:8.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Oct-25    

Information published.


Important Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-10729
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 qtsvg 6.6.1-2 on Azure Linux 3.0 Important Unknown None Base: 9.3
Temporal: 8.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U
Unknown Unknown None
cbl2 qt5-qtsvg 5.12.11-6 on CBL Mariner 2.0 Important Unknown None Base: 9.3
Temporal: 8.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-10729 None

CVE-2025-49844 - Redis Lua Use-After-Free may lead to remote code execution

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-49844
MITRE
NVD

Issuing CNA: GitHub_M

CVE Title: Redis Lua Use-After-Free may lead to remote code execution
CVSS:

CVSS:3.1 Highest BaseScore:9.9/TemporalScore:9.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Oct-25    

Information published.


Critical Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-49844
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 ceph 18.2.2-10 on Azure Linux 3.0 Critical Unknown None Base: 9.9
Temporal: 9.9
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
azl3 valkey 8.0.4-1 on Azure Linux 3.0 Critical Unknown None Base: 9.9
Temporal: 9.9
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
cbl2 ceph 16.2.10-9 on CBL Mariner 2.0 Critical Unknown None Base: 9.9
Temporal: 9.9
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
cbl2 redis 6.2.18-3 on CBL Mariner 2.0 CBL-Mariner Releases (Security Update) Critical Unknown Base: 9.9
Temporal: 9.9
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
6.2.20-1
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-49844 None

CVE-2025-8291 - ZIP64 End of Central Directory (EOCD) Locator record offset not checked

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-8291
MITRE
NVD

Issuing CNA: PSF

CVE Title: ZIP64 End of Central Directory (EOCD) Locator record offset not checked
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-8291
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 python3 3.12.9-4 on Azure Linux 3.0 Moderate Unknown None Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Unknown Unknown None
azl3 tensorflow 2.16.1-9 on Azure Linux 3.0 Moderate Unknown None Base: 4.3
Temporal: 4.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U
Unknown Unknown None
cbl2 python3 3.9.19-14 on CBL Mariner 2.0 Moderate Unknown None Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Unknown Unknown None
cbl2 python3 3.9.19-15 on CBL Mariner 2.0 Moderate Unknown None Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-8291 None

CVE-2025-39958 - iommu/s390: Make attach succeed when the device was surprise removed

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39958
MITRE
NVD

Issuing CNA: Linux

CVE Title: iommu/s390: Make attach succeed when the device was surprise removed
CVSS:

CVSS:3.1 Highest BaseScore:4.0/TemporalScore:3.7
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Oct-25    

Information published.


Low Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39958
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Low Unknown None Base: 4.0
Temporal: 3.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39958 None

CVE-2025-39957 - wifi: mac80211: increase scan_ies_len for S1G

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39957
MITRE
NVD

Issuing CNA: Linux

CVE Title: wifi: mac80211: increase scan_ies_len for S1G
CVSS:

CVSS:3.1 Highest BaseScore:4.0/TemporalScore:3.7
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Oct-25    

Information published.


Low Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39957
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Low Unknown None Base: 4.0
Temporal: 3.7
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39957 None

CVE-2025-46817 - Lua library commands may lead to integer overflow and potential RCE

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-46817
MITRE
NVD

Issuing CNA: GitHub_M

CVE Title: Lua library commands may lead to integer overflow and potential RCE
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Oct-25    

Information published.


Important Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-46817
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 valkey 8.0.4-1 on Azure Linux 3.0 CBL-Mariner Releases (Security Update) Important Unknown Base: 7.0
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
8.0.6-1
No None
cbl2 redis 6.2.18-3 on CBL Mariner 2.0 Important Unknown None Base: 7.0
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
cbl2 redis 6.2.20-1 on CBL Mariner 2.0 Important Unknown None Base: 7.0
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-46817 None

CVE-2025-46818 - Redis: Authenticated users can execute LUA scripts as a different user

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-46818
MITRE
NVD

Issuing CNA: GitHub_M

CVE Title: Redis: Authenticated users can execute LUA scripts as a different user
CVSS:

CVSS:3.1 Highest BaseScore:6.0/TemporalScore:6.0
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-46818
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 valkey 8.0.4-1 on Azure Linux 3.0 CBL-Mariner Releases (Security Update) Moderate Unknown Base: 6.0
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
8.0.6-1
No None
cbl2 redis 6.2.20-1 on CBL Mariner 2.0 Moderate Unknown None Base: 6.0
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-46818 None

CVE-2025-39961 - iommu/amd/pgtbl: Fix possible race while increase page table level

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-39961
MITRE
NVD

Issuing CNA: Linux

CVE Title: iommu/amd/pgtbl: Fix possible race while increase page table level
CVSS:

CVSS:3.1 Highest BaseScore:5.8/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-39961
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 kernel 6.6.96.2-2 on Azure Linux 3.0 Moderate Unknown None Base: 5.8
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-39961 None

CVE-2025-11495 - GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11495
MITRE
NVD

Issuing CNA: VulDB

CVE Title: GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate_section heap-based overflow
CVSS:

CVSS:3.1 Highest BaseScore:3.3/TemporalScore:3.0
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11495
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 binutils 2.41-7 on Azure Linux 3.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
azl3 crash 8.0.4-4 on Azure Linux 3.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 binutils 2.37-16 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 binutils 2.37-17 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 crash 8.0.1-4 on CBL Mariner 2.0 Low Unknown None Base: 3.3
Temporal: 3.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U
Unknown Unknown None
cbl2 gdb 11.2-6 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 gdb 11.2-7 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11495 None

CVE-2025-11413 - GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11413
MITRE
NVD

Issuing CNA: VulDB

CVE Title: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
CVSS:

CVSS:3.1 Highest BaseScore:3.3/TemporalScore:3.0
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11413
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 binutils 2.41-7 on Azure Linux 3.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 binutils 2.37-16 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 binutils 2.37-17 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 gdb 11.2-6 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 gdb 11.2-7 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11413 None

CVE-2025-11414 - GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-11414
MITRE
NVD

Issuing CNA: VulDB

CVE Title: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
CVSS:

CVSS:3.1 Highest BaseScore:3.3/TemporalScore:3.0
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Oct-25    

Information published.


Moderate Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-11414
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
azl3 binutils 2.41-7 on Azure Linux 3.0 Low Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 binutils 2.37-16 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 binutils 2.37-17 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 gdb 11.2-6 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None
cbl2 gdb 11.2-7 on CBL Mariner 2.0 Moderate Unknown None Base: 3.3
Temporal: 3.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-11414 None