This report contains detail for the following vulnerabilities:
CVE Issued by | Tag | CVE ID | CVE Title |
---|---|---|---|
Microsoft | Active Directory Domain Services | CVE-2025-29810 | Active Directory Domain Services Elevation of Privilege Vulnerability |
Microsoft | ASP.NET Core | CVE-2025-26682 | ASP.NET Core and Visual Studio Denial of Service Vulnerability |
Microsoft | Azure Local | CVE-2025-27489 | Azure Local Elevation of Privilege Vulnerability |
Microsoft | Azure Local Cluster | CVE-2025-26628 | Azure Local Cluster Information Disclosure Vulnerability |
Microsoft | Azure Local Cluster | CVE-2025-25002 | Azure Local Cluster Information Disclosure Vulnerability |
Microsoft | Azure Portal Windows Admin Center | CVE-2025-29819 | Windows Admin Center in Azure Portal Information Disclosure Vulnerability |
Microsoft | Dynamics Business Central | CVE-2025-29821 | Microsoft Dynamics Business Central Information Disclosure Vulnerability |
security@golang.org | Mariner | CVE-2024-45338 | Unknown |
support@hackerone.com | Mariner | CVE-2024-21896 | Unknown |
security@golang.org | Mariner | CVE-2023-45288 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-45310 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-54680 | Unknown |
secalert@redhat.com | Mariner | CVE-2024-10041 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-51744 | Unknown |
security-advisories@github.com | Mariner | CVE-2025-27144 | Unknown |
report@snyk.io | Mariner | CVE-2021-23336 | Unknown |
secalert@redhat.com | Mariner | CVE-2012-2677 | Unknown |
cve@mitre.org | Mariner | CVE-2019-20907 | Unknown |
security@apache.org | Mariner | CVE-2024-52338 | Unknown |
cve@mitre.org | Mariner | CVE-2020-22217 | Unknown |
secalert@redhat.com | Mariner | CVE-2021-3672 | Unknown |
security@php.net | Mariner | CVE-2025-1736 | Unknown |
security@php.net | Mariner | CVE-2025-1734 | Unknown |
security@hashicorp.com | Mariner | CVE-2024-6104 | Unknown |
cve@mitre.org | Mariner | CVE-2019-9674 | Unknown |
cve@mitre.org | Mariner | CVE-2007-4559 | Unknown |
security@php.net | Mariner | CVE-2025-1861 | Unknown |
cve@mitre.org | Mariner | CVE-2012-6708 | Unknown |
cve@mitre.org | Mariner | CVE-2015-9251 | Unknown |
cve_disclosure@tech.gov.sg | Mariner | CVE-2025-1744 | Unknown |
security@php.net | Mariner | CVE-2025-1219 | Unknown |
cve@mitre.org | Mariner | CVE-2017-17522 | Unknown |
cve@mitre.org | Mariner | CVE-2017-18207 | Unknown |
cve@mitre.org | Mariner | CVE-2025-24855 | Unknown |
secalert_us@oracle.com | Mariner | CVE-2025-21490 | Unknown |
secure@intel.com | Mariner | CVE-2019-14584 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-34062 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-52006 | Unknown |
security-advisories@github.com | Mariner | CVE-2025-29923 | Unknown |
cve-coordination@google.com | Mariner | CVE-2021-22569 | Unknown |
security@golang.org | Mariner | CVE-2025-22870 | Unknown |
secalert@redhat.com | Mariner | CVE-2024-3727 | Unknown |
support@hackerone.com | Mariner | CVE-2024-22019 | Unknown |
cve@mitre.org | Mariner | CVE-2024-52949 | Unknown |
secalert@redhat.com | Mariner | CVE-2023-40546 | Unknown |
security-advisories@github.com | Mariner | CVE-2025-30204 | Unknown |
security@golang.org | Mariner | CVE-2022-32149 | Unknown |
security@php.net | Mariner | CVE-2025-1217 | Unknown |
secalert@redhat.com | Mariner | CVE-2023-1393 | Unknown |
cve@mitre.org | Mariner | CVE-2024-37535 | Unknown |
security@ubuntu.com | Mariner | CVE-2022-28737 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-25629 | Unknown |
cve@mitre.org | Mariner | CVE-2022-40898 | Unknown |
security@golang.org | Mariner | CVE-2024-45337 | Unknown |
secalert@redhat.com | Mariner | CVE-2023-40548 | Unknown |
security@huntr.dev | Mariner | CVE-2024-7776 | Unknown |
secalert@redhat.com | Mariner | CVE-2024-7383 | Unknown |
secalert@redhat.com | Mariner | CVE-2021-20277 | Unknown |
cve@mitre.org | Mariner | CVE-2024-31745 | Unknown |
cve@mitre.org | Mariner | CVE-2024-55549 | Unknown |
secalert@redhat.com | Mariner | CVE-2021-20286 | Unknown |
secalert@redhat.com | Mariner | CVE-2023-40550 | Unknown |
cve@mitre.org | Mariner | CVE-2023-30570 | Unknown |
cve-assign@fb.com | Mariner | CVE-2021-24032 | Unknown |
secalert@redhat.com | Mariner | CVE-2023-40549 | Unknown |
security@libreswan.org | Mariner | CVE-2024-3652 | Unknown |
secalert@redhat.com | Mariner | CVE-2024-2002 | Unknown |
secalert@redhat.com | Mariner | CVE-2020-27840 | Unknown |
secalert@redhat.com | Mariner | CVE-2022-32746 | Unknown |
secalert@redhat.com | Mariner | CVE-2019-3816 | Unknown |
secalert@redhat.com | Mariner | CVE-2019-3833 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-32021 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-50349 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-32465 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-32020 | Unknown |
Microsoft | Microsoft AutoUpdate (MAU) | CVE-2025-29800 | Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability |
Microsoft | Microsoft AutoUpdate (MAU) | CVE-2025-29801 | Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-3073 | Chromium: CVE-2025-3073 Inappropriate implementation in Autofill |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-3068 | Chromium: CVE-2025-3068 Inappropriate implementation in Intents |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-3074 | Chromium: CVE-2025-3074 Inappropriate implementation in Downloads |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-3067 | Chromium: CVE-2025-3067 Inappropriate implementation in Custom Tabs |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-3071 | Chromium: CVE-2025-3071 Inappropriate implementation in Navigations |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-3072 | Chromium: CVE-2025-3072 Inappropriate implementation in Custom Tabs |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-3070 | Chromium: CVE-2025-3070 Insufficient validation of untrusted input in Extensions |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-3069 | Chromium: CVE-2025-3069 Inappropriate implementation in Extensions |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2025-25000 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2025-29815 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2025-25001 | Microsoft Edge for iOS Spoofing Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-3066 | Chromium: CVE-2025-3066 Use after free in Navigations |
Microsoft | Microsoft Edge for iOS | CVE-2025-29796 | Microsoft Edge for iOS Spoofing Vulnerability |
Microsoft | Microsoft Office | CVE-2025-27745 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2025-27744 | Microsoft Office Elevation of Privilege Vulnerability |
Microsoft | Microsoft Office | CVE-2025-26642 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2025-29792 | Microsoft Office Elevation of Privilege Vulnerability |
Microsoft | Microsoft Office | CVE-2025-29791 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2025-27748 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2025-27746 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2025-27749 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-27751 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-27750 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-29823 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-27752 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office OneNote | CVE-2025-29822 | Microsoft OneNote Security Feature Bypass Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2025-29794 | Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2025-29793 | Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Word | CVE-2025-27747 | Microsoft Word Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Word | CVE-2025-29816 | Microsoft Word Security Feature Bypass Vulnerability |
Microsoft | Microsoft Office Word | CVE-2025-29820 | Microsoft Word Remote Code Execution Vulnerability |
Microsoft | Microsoft Streaming Service | CVE-2025-27471 | Microsoft Streaming Service Denial of Service Vulnerability |
Microsoft | Microsoft Virtual Hard Drive | CVE-2025-26688 | Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability |
Microsoft | OpenSSH for Windows | CVE-2025-27731 | Microsoft OpenSSH for Windows Elevation of Privilege Vulnerability |
Microsoft | Outlook for Android | CVE-2025-29805 | Outlook for Android Information Disclosure Vulnerability |
Microsoft | Remote Desktop Client | CVE-2025-27487 | Remote Desktop Client Remote Code Execution Vulnerability |
Microsoft | Remote Desktop Gateway Service | CVE-2025-27482 | Windows Remote Desktop Services Remote Code Execution Vulnerability |
Microsoft | Remote Desktop Gateway Service | CVE-2025-27480 | Windows Remote Desktop Services Remote Code Execution Vulnerability |
Microsoft | RPC Endpoint Mapper Service | CVE-2025-26679 | RPC Endpoint Mapper Service Elevation of Privilege Vulnerability |
Microsoft | System Center | CVE-2025-27743 | Microsoft System Center Elevation of Privilege Vulnerability |
Microsoft | Visual Studio | CVE-2025-29802 | Visual Studio Elevation of Privilege Vulnerability |
Microsoft | Visual Studio | CVE-2025-29804 | Visual Studio Elevation of Privilege Vulnerability |
Microsoft | Visual Studio Code | CVE-2025-20570 | Visual Studio Code Elevation of Privilege Vulnerability |
Microsoft | Visual Studio Tools for Applications and SQL Server Management Studio | CVE-2025-29803 | Visual Studio Tools for Applications and SQL Server Management Studio Elevation of Privilege Vulnerability |
Microsoft | Windows Active Directory Certificate Services | CVE-2025-27740 | Active Directory Certificate Services Elevation of Privilege Vulnerability |
Microsoft | Windows BitLocker | CVE-2025-26637 | BitLocker Security Feature Bypass Vulnerability |
Microsoft | Windows Bluetooth Service | CVE-2025-27490 | Windows Bluetooth Service Elevation of Privilege Vulnerability |
Microsoft | Windows Common Log File System Driver | CVE-2025-29824 | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Cryptographic Services | CVE-2025-29808 | Windows Cryptographic Services Information Disclosure Vulnerability |
Microsoft | Windows Cryptographic Services | CVE-2025-26641 | Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability |
Microsoft | Windows Defender Application Control (WDAC) | CVE-2025-26678 | Windows Defender Application Control Security Feature Bypass Vulnerability |
Microsoft | Windows Digital Media | CVE-2025-27730 | Windows Digital Media Elevation of Privilege Vulnerability |
Microsoft | Windows Digital Media | CVE-2025-27467 | Windows Digital Media Elevation of Privilege Vulnerability |
Microsoft | Windows Digital Media | CVE-2025-26640 | Windows Digital Media Elevation of Privilege Vulnerability |
Microsoft | Windows Digital Media | CVE-2025-27476 | Windows Digital Media Elevation of Privilege Vulnerability |
Microsoft | Windows DWM Core Library | CVE-2025-24074 | Microsoft DWM Core Library Elevation of Privilege Vulnerability |
Microsoft | Windows DWM Core Library | CVE-2025-24073 | Microsoft DWM Core Library Elevation of Privilege Vulnerability |
Microsoft | Windows DWM Core Library | CVE-2025-24058 | Windows DWM Core Library Elevation of Privilege Vulnerability |
Microsoft | Windows DWM Core Library | CVE-2025-24062 | Microsoft DWM Core Library Elevation of Privilege Vulnerability |
Microsoft | Windows DWM Core Library | CVE-2025-24060 | Microsoft DWM Core Library Elevation of Privilege Vulnerability |
Microsoft | Windows Hello | CVE-2025-26635 | Windows Hello Security Feature Bypass Vulnerability |
Microsoft | Windows Hello | CVE-2025-26644 | Windows Hello Spoofing Vulnerability |
Microsoft | Windows HTTP.sys | CVE-2025-27473 | HTTP.sys Denial of Service Vulnerability |
Microsoft | Windows Hyper-V | CVE-2025-27491 | Windows Hyper-V Remote Code Execution Vulnerability |
Microsoft | Windows Installer | CVE-2025-27727 | Windows Installer Elevation of Privilege Vulnerability |
Microsoft | Windows Kerberos | CVE-2025-26647 | Windows Kerberos Elevation of Privilege Vulnerability |
Microsoft | Windows Kerberos | CVE-2025-27479 | Kerberos Key Distribution Proxy Service Denial of Service Vulnerability |
Microsoft | Windows Kerberos | CVE-2025-29809 | Windows Kerberos Security Feature Bypass Vulnerability |
Microsoft | Windows Kernel | CVE-2025-26648 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2025-27739 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel Memory | CVE-2025-29812 | DirectX Graphics Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel-Mode Drivers | CVE-2025-27728 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability |
Microsoft | Windows LDAP - Lightweight Directory Access Protocol | CVE-2025-26673 | Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability |
Microsoft | Windows LDAP - Lightweight Directory Access Protocol | CVE-2025-26663 | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
Microsoft | Windows LDAP - Lightweight Directory Access Protocol | CVE-2025-27469 | Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability |
Microsoft | Windows LDAP - Lightweight Directory Access Protocol | CVE-2025-26670 | Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability |
Microsoft | Windows Local Security Authority (LSA) | CVE-2025-21191 | Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability |
Microsoft | Windows Local Security Authority (LSA) | CVE-2025-27478 | Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability |
Microsoft | Windows Local Session Manager (LSM) | CVE-2025-26651 | Windows Local Session Manager (LSM) Denial of Service Vulnerability |
Microsoft | Windows Mark of the Web (MOTW) | CVE-2025-27472 | Windows Mark of the Web Security Feature Bypass Vulnerability |
Microsoft | Windows Media | CVE-2025-26666 | Windows Media Remote Code Execution Vulnerability |
Microsoft | Windows Media | CVE-2025-26674 | Windows Media Remote Code Execution Vulnerability |
Microsoft | Windows Mobile Broadband | CVE-2025-29811 | Windows Mobile Broadband Driver Elevation of Privilege Vulnerability |
Microsoft | Windows NTFS | CVE-2025-27742 | NTFS Information Disclosure Vulnerability |
Microsoft | Windows NTFS | CVE-2025-21197 | Windows NTFS Information Disclosure Vulnerability |
Microsoft | Windows NTFS | CVE-2025-27741 | NTFS Elevation of Privilege Vulnerability |
Microsoft | Windows NTFS | CVE-2025-27483 | NTFS Elevation of Privilege Vulnerability |
Microsoft | Windows NTFS | CVE-2025-27733 | NTFS Elevation of Privilege Vulnerability |
Microsoft | Windows Power Dependency Coordinator | CVE-2025-27736 | Windows Power Dependency Coordinator Information Disclosure Vulnerability |
Microsoft | Windows Remote Desktop Services | CVE-2025-26671 | Windows Remote Desktop Services Remote Code Execution Vulnerability |
Microsoft | Windows Resilient File System (ReFS) | CVE-2025-27738 | Windows Resilient File System (ReFS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-27474 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-21203 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-26668 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-26667 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-26664 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-26672 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-26669 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-26676 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Secure Channel | CVE-2025-27492 | Windows Secure Channel Elevation of Privilege Vulnerability |
Microsoft | Windows Secure Channel | CVE-2025-26649 | Windows Secure Channel Elevation of Privilege Vulnerability |
Microsoft | Windows Security Zone Mapping | CVE-2025-27737 | Windows Security Zone Mapping Security Feature Bypass Vulnerability |
Microsoft | Windows Shell | CVE-2025-27729 | Windows Shell Remote Code Execution Vulnerability |
Microsoft | Windows Standards-Based Storage Management Service | CVE-2025-27485 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability |
Microsoft | Windows Standards-Based Storage Management Service | CVE-2025-27486 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability |
Microsoft | Windows Standards-Based Storage Management Service | CVE-2025-21174 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability |
Microsoft | Windows Standards-Based Storage Management Service | CVE-2025-26680 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability |
Microsoft | Windows Standards-Based Storage Management Service | CVE-2025-27470 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability |
Microsoft | Windows Standards-Based Storage Management Service | CVE-2025-26652 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability |
Microsoft | Windows Subsystem for Linux | CVE-2025-26675 | Windows Subsystem for Linux Elevation of Privilege Vulnerability |
Microsoft | Windows TCP/IP | CVE-2025-26686 | Windows TCP/IP Remote Code Execution Vulnerability |
Microsoft | Windows Telephony Service | CVE-2025-27481 | Windows Telephony Service Remote Code Execution Vulnerability |
Microsoft | Windows Telephony Service | CVE-2025-21222 | Windows Telephony Service Remote Code Execution Vulnerability |
Microsoft | Windows Telephony Service | CVE-2025-21205 | Windows Telephony Service Remote Code Execution Vulnerability |
Microsoft | Windows Telephony Service | CVE-2025-21221 | Windows Telephony Service Remote Code Execution Vulnerability |
Microsoft | Windows Telephony Service | CVE-2025-27477 | Windows Telephony Service Remote Code Execution Vulnerability |
Microsoft | Windows Universal Plug and Play (UPnP) Device Host | CVE-2025-27484 | Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability |
Microsoft | Windows Update Stack | CVE-2025-21204 | Windows Process Activation Elevation of Privilege Vulnerability |
Microsoft | Windows Update Stack | CVE-2025-27475 | Windows Update Stack Elevation of Privilege Vulnerability |
Microsoft | Windows upnphost.dll | CVE-2025-26665 | Windows upnphost.dll Elevation of Privilege Vulnerability |
Microsoft | Windows USB Print Driver | CVE-2025-26639 | Windows USB Print Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Virtualization-Based Security (VBS) Enclave | CVE-2025-27735 | Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability |
Microsoft | Windows Win32K - GRFX | CVE-2025-27732 | Windows Graphics Component Elevation of Privilege Vulnerability |
Microsoft | Windows Win32K - GRFX | CVE-2025-26687 | Win32k Elevation of Privilege Vulnerability |
Microsoft | Windows Win32K - GRFX | CVE-2025-26681 | Win32k Elevation of Privilege Vulnerability |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26663
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. How could an attacker exploit this vulnerability? An unauthenticated attacker could sequentially send specially crafted requests to a vulnerable LDAP server. Successful exploitation could result in a use after free which could be leveraged to achieve remote code execution. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26663 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Critical | Remote Code Execution | None | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Critical | Remote Code Execution | None | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Critical | Remote Code Execution | 5053888 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Critical | Remote Code Execution | 5053888 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Critical | Remote Code Execution | 5053888 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Critical | Remote Code Execution | 5053888 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Critical | Remote Code Execution | 5053620 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Critical | Remote Code Execution | 5053620 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Critical | Remote Code Execution | 5053886 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Critical | Remote Code Execution | 5053886 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Critical | Remote Code Execution | 5053887 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Critical | Remote Code Execution | 5053887 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Critical | Remote Code Execution | 5053603 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Critical | Remote Code Execution | 5053603 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Critical | Remote Code Execution | 5053599 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26663 | Kunlun Lab with https://www.cyberkl.com/ |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26664
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26664 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Information Disclosure | 5053599 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26664 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26665
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows upnphost.dll Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Sensitive data storage in improperly locked memory in Windows upnphost.dll allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26665 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26665 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26666
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Media Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26666 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Remote Code Execution | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26666 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26669
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26669 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Information Disclosure | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Information Disclosure | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Information Disclosure | 5053599 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26669 | Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26667
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26667 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Information Disclosure | 5053599 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26667 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26668
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26668 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Remote Code Execution | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Remote Code Execution | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Remote Code Execution | 5053599 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26668 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26681
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:6.0
Executive Summary: Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An authenticated user needs to interact with a malicious printer. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26681 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 6.7 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26681 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26680
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26680 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26680 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26686
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows TCP/IP Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Sensitive data storage in improperly locked memory in Windows TCP/IP allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition and also to take additional actions prior to exploitation to prepare the target environment. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metrics, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection to send a DHCPv6 request. The attacker could then send a DHCPv6 reply with a fake IPv6 address. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26686 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Critical | Remote Code Execution | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Critical | Remote Code Execution | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Critical | Remote Code Execution | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Critical | Remote Code Execution | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Critical | Remote Code Execution | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Critical | Remote Code Execution | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Critical | Remote Code Execution | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Critical | Remote Code Execution | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Critical | Remote Code Execution | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Critical | Remote Code Execution | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Critical | Remote Code Execution | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Critical | Remote Code Execution | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Critical | Remote Code Execution | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Critical | Remote Code Execution | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Critical | Remote Code Execution | 5053599 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26686 | @TrueUnitySect |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26687
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Use after free in Windows Win32K - GRFX allows an unauthorized attacker to elevate privileges over a network. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26687 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Office for Android | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.18730.20000 |
Maybe | None | |
Microsoft Office for Universal | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.14326.22331 |
Maybe | None | |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26687 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26688
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Stack-based buffer overflow in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26688 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26688 | DongJun Kim with Enki WhiteHat Jongseong Kim with Enki WhiteHat |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27471
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Streaming Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.2
Executive Summary: Sensitive data storage in improperly locked memory in Microsoft Streaming Service allows an unauthorized attacker to deny service over a network. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27471 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Denial of Service | None | Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Denial of Service | None | Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Denial of Service | 5053620 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Denial of Service | 5053620 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Denial of Service | 5053886 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Denial of Service | 5053886 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Denial of Service | 5053599 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27471 | k0shl with Kunlun Lab Zhiniang Peng with HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27470
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27470 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27470 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27473
MITRE NVD Issuing CNA: Microsoft |
CVE Title: HTTP.sys Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Uncontrolled resource consumption in Windows HTTP.sys allows an unauthorized attacker to deny service over a network. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27473 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Denial of Service | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Denial of Service | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Denial of Service | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Denial of Service | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Denial of Service | 5053599 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27473 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27472
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Mark of the Web Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.4/TemporalScore:4.7
Executive Summary: Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature over a network. FAQ: According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L) and some loss of availability (A:L). What does that mean for this vulnerability? An attacker can craft a malicious file that would evade Mark of the Web (MOTW) defenses, resulting in a limited loss of integrity and availability of security features such as SmartScreen Application Reputation security check and/or the legacy Windows Attachment Services security prompt. How could an attacker exploit the vulnerability? To exploit this vulnerability, an attacker could host a file on an attacker-controlled server, then convince a targeted user to download and open the file. This could allow the attacker to interfere with the Mark of the Web functionality. Please see Additional information about Mark of the Web for further clarification Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27472 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Security Feature Bypass | None | Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Security Feature Bypass | None | Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Security Feature Bypass | 5053886 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Security Feature Bypass | 5053886 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Security Feature Bypass | 5053887 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Security Feature Bypass | 5053887 |
Base: 5.4 Temporal: 4.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27472 | Blaz Satler with 0patch by ACROS Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27474
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27474 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Information Disclosure | 5053599 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27474 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27476
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Digital Media Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27476 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27476 | Dongjun Kim (smlijun) with Ajou University & ENKI WhiteHat |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27475
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Update Stack Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Sensitive data storage in improperly locked memory in Windows Update Stack allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27475 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27475 | Jongseong Kim (nevul37) with Ajou University, and working at ENKI WhiteHat |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27477
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Telephony Service Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. FAQ: How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27477 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Remote Code Execution | 5053599 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27477 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27478
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Heap-based buffer overflow in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27478 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27478 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27479
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Kerberos Key Distribution Proxy Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Insufficient resource pool in Windows Kerberos allows an unauthorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27479 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Denial of Service | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Denial of Service | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Denial of Service | 5053599 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27479 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27740
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Active Directory Certificate Services Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Weak authentication in Windows Active Directory Certificate Services allows an authorized attacker to elevate privileges over a network. FAQ: How could an attacker exploit this vulnerability? An authenticated user could manipulate attributes on computer accounts they own or manage, and acquire a certificate from Active Directory Certificate Services that would allow elevation of privilege to System. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain domain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27740 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27740 | Konstantin Ruhmann with Volkswagen Financial Services AG Konstantin Ruhmann with Volkswagen Financial Services AG |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27741
MITRE NVD Issuing CNA: Microsoft |
CVE Title: NTFS Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability? An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27741 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27741 | Will Dormann with Vul Labs |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27744
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper access control in Microsoft Office allows an authorized attacker to elevate privileges locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27744 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Office 2016 (64-bit edition) | 5002669 (Security Update) | Important | Elevation of Privilege | 2920716 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1000 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-27744 | Simon (@sim0nsecurity) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27742
MITRE NVD Issuing CNA: Microsoft |
CVE Title: NTFS Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Out-of-bounds read in Windows NTFS allows an unauthorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability? An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27742 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Information Disclosure | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Information Disclosure | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Information Disclosure | 5053599 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27742 | George Hughey with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27745
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27745 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002700 (Security Update) | Critical | Remote Code Execution | 5002693 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002700 (Security Update) | Critical | Remote Code Execution | 5002693 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-27745 | 0x140ce(Peace & Love) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27746
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27746 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 4484432 (Security Update) | Important | Remote Code Execution | 4018319 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1000 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 4484432 (Security Update) | Important | Remote Code Execution | 4018319 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Office Online Server | 5002699 (Security Update) | Important | Remote Code Execution | 5002690 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20003 |
Maybe | None |
SharePoint Server Subscription Edition Language Pack | 5002680 (Security Update) | Important | Remote Code Execution | 5002667 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20003 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-27746 | Li Shuang and willJ with Vulnerability Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27748
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27748 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002700 (Security Update) | Critical | Remote Code Execution | 5002693 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002700 (Security Update) | Critical | Remote Code Execution | 5002693 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-27748 | 0x140ce |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27747
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27747 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft SharePoint Enterprise Server 2016 | 5002692 (Security Update) 5002682 (Security Update) |
Important | Remote Code Execution | 5002685 5002671 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002691 (Security Update) 5002680 (Security Update) |
Important | Remote Code Execution | 5002678 5002667 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20003 |
Maybe | None |
Microsoft Word 2016 (32-bit edition) | 5002702 (Security Update) | Important | Remote Code Execution | 5002662 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Word 2016 (64-bit edition) | 5002702 (Security Update) | Important | Remote Code Execution | 5002662 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-27747 | Zhiniang Peng with HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27749
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27749 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002700 (Security Update) | Critical | Remote Code Execution | 5002693 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002700 (Security Update) | Critical | Remote Code Execution | 5002693 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: N/A Temporal: N/A Vector: N/A |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: N/A Temporal: N/A Vector: N/A |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-27749 | 0x140ce |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27743
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft System Center Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Untrusted search path in System Center allows an authorized attacker to elevate privileges locally. FAQ: What Microsoft System Center Products are affected by this vulnerability? This vulnerability affects the following products under the Microsoft System Center:
For more information about these products see System Center documentation. Will the product version change with the new installation media? No. The RTM version of all System Center products remain unchanged. There's no change in the product version. What existing System Center deployments are affected by this vulnerability? There are no existing System Center deployments impacted by this vulnerability. However, it is recommended that users delete the existing installer setup files (.exe) and then download the latest version of their System Center product (.ZIP) found in the table below. What actions do customers need to take to protect themselves from this vulnerability? Only customers who re-use existing System Center installer files (.exe) files to deploy new instances in their environment are affected by this vulnerability. Customers performing installations in this manner must delete the existing installer setup files (.exe) and then download the latest version of their System Center product linked in the following table. Customers who download new versions of the setup files (.ZIP) for new deployments are not affected and do not need to perform any action to mitigate the vulnerability. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack vector is local (AV:L). What does this mean for this vulnerability? To successfully exploit this vulnerability, an attacker must have access to the device to access the System Center Windows installer packages and then utilize DLL hijacking. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to have access to the location where the target file will be run. They would then need to plant a specific file that would be used as part of the exploitation. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27743 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
System Center Data Protection Manager 2019 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
System Center Data Protection Manager 2022 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
System Center Data Protection Manager 2025 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
System Center Operations Manager 2019 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
System Center Operations Manager 2022 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
System Center Operations Manager 2025 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
System Center Orchestrator 2019 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
System Center Orchestrator 2022 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
System Center Orchestrator 2025 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
System Center Service Manager 2019 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
System Center Service Manager 2022 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
System Center Service Manager 2025 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
System Center Virtual Machine Manager 2019 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
System Center Virtual Machine Manager 2022 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
System Center Virtual Machine Manager 2025 | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-27743 | Sandro Poppi |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27751
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27751 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002704 (Security Update) | Important | Remote Code Execution | 5002696 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002704 (Security Update) | Important | Remote Code Execution | 5002696 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Office Online Server | 5002699 (Security Update) | Important | Remote Code Execution | 5002690 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20003 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-27751 | f4(@dnpushme) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27752
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27752 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002700 (Security Update) | Critical | Remote Code Execution | 5002693 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002700 (Security Update) | Critical | Remote Code Execution | 5002693 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-27752 | 0x140ce |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27750
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27750 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002704 (Security Update) | Important | Remote Code Execution | 5002696 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002704 (Security Update) | Important | Remote Code Execution | 5002696 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-27750 | f4(@dnpushme) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-29791
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-29791 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002700 (Security Update) | Critical | Remote Code Execution | 5002693 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002700 (Security Update) | Critical | Remote Code Execution | 5002693 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Critical | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-29791 | 0x140ce |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-29793
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability? The attack vector is Network (AV:N) because this vulnerability is remotely exploitable and can be exploited from the internet. The attack complexity is Low (AC:L) because an attacker does not require significant prior knowledge of the system and can achieve repeatable success with the payload against the vulnerable component. According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability? An authenticated attacker with Site Owner permissions can use the vulnerability to inject arbitrary code and execute this code in the context of SharePoint Server. How could an attacker exploit the vulnerability? In a network-based attack, an authenticated attacker, as at least a Site Owner, could write arbitrary code to inject and execute code remotely on the SharePoint Server. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-29793 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Enterprise Server 2016 | 5002692 (Security Update) | Important | Remote Code Execution | 5002685 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002691 (Security Update) | Important | Remote Code Execution | 5002678 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20003 |
Maybe | None |
Microsoft SharePoint Server Subscription Edition | 5002705 (Security Update) | Important | Remote Code Execution | 5002681 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.18526.20172 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-29793 | zcgonvh |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-29792
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally. FAQ: How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-29792 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002700 (Security Update) | Important | Elevation of Privilege | 5002693 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002700 (Security Update) | Important | Elevation of Privilege | 5002693 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Elevation of Privilege | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None |
CVE ID | Acknowledgements |
CVE-2025-29792 | 邹瑞伦 with Codesafe Team of Legendsec at Qi'anxin Group |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||
CVE-2025-29796
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge for iOS Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.2
Executive Summary: User interface (ui) misrepresentation of critical information in Microsoft Edge for iOS allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? A user could be tricked into entering credentials or responding to a pop up after opening a specially crafted file or clicking on a link, typically by way of an enticement in an email or URL. What is the version information for this release?
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability? The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site. Mitigations: None Workarounds: None Revision: 1.0    03-Apr-25     Information published. |
Low | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-29796 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge for iOS | Release Notes (Security Update) | Low | Spoofing | Base: 4.7 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:P/RL:O/RC:C |
135.0.3179.54 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-29796 | Barath Stalin K |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-29794
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Improper authorization in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability? The attack vector is Network (AV:N) because this vulnerability is remotely exploitable and can be exploited from the internet. The attack complexity is Low (AC:L) because an attacker does not require significant prior knowledge of the system and can achieve repeatable success with the payload against the vulnerable component. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. How could an attacker exploit the vulnerability? In a network-based attack, an authenticated attacker, as at least a Site Owner, could write arbitrary code to inject and execute code remotely on the SharePoint Server. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-29794 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Enterprise Server 2016 | 5002692 (Security Update) | Important | Remote Code Execution | 5002685 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002691 (Security Update) | Important | Remote Code Execution | 5002678 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20003 |
Maybe | None |
Microsoft SharePoint Server Subscription Edition | 5002705 (Security Update) | Important | Remote Code Execution | 5002681 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.18526.20172 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-29794 | cjm00n with Cyber Kunlun & Zhiniang Peng |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-29821
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Dynamics Business Central Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Improper input validation in Dynamics Business Central allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker that successfully exploited this vulnerability could recover cleartext passwords from memory. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-29821 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Dynamics 365 Business Central 2023 Wave 2 – Update 23.18 | 5056716 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
23.18.32409 |
Maybe | None | |
Microsoft Dynamics 365 Business Central 2024 Wave 2 – Update 25.6 | 5056718 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
25.6.32556 |
Maybe | None | |
Microsoft Dynamics 365 Business Central 2025 Wave 1 – Update 26.0 | Release Notes (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
26.0.32481 |
Maybe | None | |
Microsoft Dynamics 365 Business Central Wave 1 2024 – Update 24.12 | 5056717 (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
24.12.32447.0 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-29821 | Nicklas Broberg Larsson with Navigot AB |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-29820
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-29820 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002702 (Security Update) | Important | Remote Code Execution | 5002662 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002702 (Security Update) | Important | Remote Code Execution | 5002662 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft SharePoint Enterprise Server 2016 | 5002692 (Security Update) 5002682 (Security Update) |
Important | Remote Code Execution | 5002685 5002671 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1002 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-29820 | Haifei Li with EXPMON |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-29822
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OneNote Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Incomplete list of disallowed inputs in Microsoft Office OneNote allows an unauthorized attacker to bypass a security feature locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft OneNote and then click on a specially crafted URL to be compromised by the attacker. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-29822 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Security Feature Bypass | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Security Feature Bypass | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Security Feature Bypass | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Security Feature Bypass | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Security Feature Bypass | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Security Feature Bypass | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Security Feature Bypass | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Security Feature Bypass | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Security Feature Bypass | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Security Feature Bypass | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft OneNote 2016 (32-bit edition) | 5002622 (Security Update) | Important | Security Feature Bypass | 4484434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1001 |
Maybe | None |
Microsoft OneNote 2016 (64-bit edition) | 5002622 (Security Update) | Important | Security Feature Bypass | 4484434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1001 |
Maybe | None |
Microsoft OneNote for Mac | Release Notes (Security Update) | Important | Security Feature Bypass | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.96.25033028 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-29822 | Daniel Weglowski |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-29823
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-29823 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None |
CVE ID | Acknowledgements |
CVE-2025-29823 | f4(@dnpushme) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-29824
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Executive Summary: Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2025-29824 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-29824 | Microsoft Threat Intelligence Center |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24074
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24074 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24074 | YanZiShuang@BigCJTeam of cyberkl |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24073
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24073 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24073 | YanZiShuang@BigCJTeam of cyberkl Microsoft Offensive Research & Security Engineering (MORSE) with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-21174
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-21174 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-21174 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-21197
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows NTFS Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability includes unauthorized access to the file system, specifically file path information. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: The following mitigating factors might be helpful in your situation: To mitigate against possible application compatibility risks, the fix to address this vulnerability has been released as disabled by default. However, administrators have been given the ability to enable this behavior if needed through a registry key. For specific instructions on how administrators can enable this behavior, please see the following article: https://support.microsoft.com/help/5058189 Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-21197 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Information Disclosure | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Information Disclosure | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Information Disclosure | 5053599 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-21197 | Sébastien Huneault with CyberQuébec |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-21191
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Time-of-check time-of-use (toctou) race condition in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-21191 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-21191 | Microsoft Offensive Research & Security Engineering with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-21205
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Telephony Service Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-21205 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Remote Code Execution | 5053599 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-21205 | Floriel (EPIN) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-21203
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-21203 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Information Disclosure | 5053599 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-21203 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-21204
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Process Activation Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. How could an attacker exploit this vulnerability? An authenticated attacker who successfully exploits this vulnerability gains the ability to perform and/or manipulate file management operations on the victim machine in the context of the NT AUTHORITY\SYSTEM account. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-21204 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-21204 | BochengXiang(@Crispr) with FDU |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-21221
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Telephony Service Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-21221 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Remote Code Execution | 5053599 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-21221 | Floriel (EPIN) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-21222
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Telephony Service Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-21222 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Remote Code Execution | 5053599 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-21222 | Floriel (EPIN) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-24058
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-24058 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-24058 | YanZiShuang@BigCJTeam of cyberkl |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||
CVE-2025-25000
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Access of resource using incompatible type ('type confusion') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network. FAQ: What is the version information for this release?
How could an attacker exploit this vulnerability via the Network? An attacker could host a specially crafted website designed to exploit the vulnerability through Microsoft Edge and then convince a user to view the website. However, in all cases an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action, typically by an enticement in an email or instant message, or by getting the user to open an attachment sent through email. Mitigations: None Workarounds: None Revision: 1.0    03-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-25000 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Important | Remote Code Execution | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
135.0.3179.54 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-25000 | Nan Wang(@eternalsakura13) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||
CVE-2025-25001
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge for iOS Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Executive Summary: Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network. FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability? An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability). According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This vulnerability requires that a user have multiple browser instances open of the affected version of Microsoft Edge (Chromium-based), one of which is a specially crafted website hosted by the attacker. The user would need to access the URL of the malicious website and then click a popup displayed on that site. What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    03-Apr-25     Information published. |
Low | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-25001 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge for iOS | Release Notes (Security Update) | Low | Spoofing | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
132.0.2957.118 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-25001 | MUHAMMAD ZAID GHIFARI with KALIMANTAN UTARA |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-25002
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Local Cluster Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Executive Summary: Insertion of sensitive information into log file in Azure Local Cluster allows an authorized attacker to disclose information over an adjacent network. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is user tokens and other potentially sensitive information. According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability? This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-25002 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Local Cluster | Release Notes (Security Update) | Important | Information Disclosure | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
2411.2 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-25002 | Alex Stanescu with Microsoft Derek Chu and Alex Stanescu with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26628
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Local Cluster Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Insufficiently protected credentials in Azure Local Cluster allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is device information such as a token, credentials, resource ids, sas tokens, user properties, and other sensitive information. According to the CVSS metrics, successful exploitation of this vulnerability could lead to a high loss of confidentiality (C:H) and integrity (I:H), and some loss of availability (A:L). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could view sensitive information, such as a token and credential in this scenario (Confidentiality) and make changes to disclosed information (Integrity), and they might be able to force a crash within the service (Availability). Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26628 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Local Cluster | Release Notes (Security Update) | Important | Information Disclosure | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C |
2411.2 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-26628 | Vani Nadh Koyi with Microsoft Vijay Chegu with Microsoft Dan DeFolo with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26639
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows USB Print Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Integer overflow or wraparound in Windows USB Print Driver allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26639 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26639 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26635
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hello Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass the Windows Hello security feature. Where can I find more information about Windows Hello? Please see Windows Hello | Microsoft Learn for more details. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26635 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Security Feature Bypass | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Security Feature Bypass | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Security Feature Bypass | 5053599 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26635 | Eduardo Barrera with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26637
MITRE NVD Issuing CNA: Microsoft |
CVE Title: BitLocker Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Executive Summary: Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. What kind of security feature could be bypassed by successfully exploiting this vulnerability? A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26637 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Security Feature Bypass | None | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Security Feature Bypass | None | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Security Feature Bypass | 5053594 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Security Feature Bypass | 5053594 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Security Feature Bypass | 5053598 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Security Feature Bypass | 5053598 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Security Feature Bypass | 5053887 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Security Feature Bypass | 5053887 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Security Feature Bypass | 5053594 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Security Feature Bypass | 5053594 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Security Feature Bypass | 5053603 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Security Feature Bypass | 5053603 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Security Feature Bypass | 5053599 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Security Feature Bypass | 5053598 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Security Feature Bypass | 5053598 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26637 | Julian Lemmerich with cirosec GmbH Lukas Dusold with cirosec GmbH |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26642
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26642 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Access 2016 (32-bit edition) | 5002701 (Security Update) | Important | Remote Code Execution | 5002697 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1000 |
Maybe | None |
Microsoft Access 2016 (64-bit edition) | 5002701 (Security Update) | Important | Remote Code Execution | 5002697 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1000 |
Maybe | None |
Microsoft Excel 2016 (32-bit edition) | 5002704 (Security Update) | Important | Remote Code Execution | 5002696 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002704 (Security Update) | Important | Remote Code Execution | 5002696 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1000 |
Maybe | None |
Microsoft Office 2016 (32-bit edition) | 5002588 (Security Update) 5002703 (Security Update) |
Important | Remote Code Execution | 5002115 5002694 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1000 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002588 (Security Update) 5002703 (Security Update) |
Important | Remote Code Execution | 5002115 5002694 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5495.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft SharePoint Server 2019 | 5002691 (Security Update) | Important | Remote Code Execution | 5002678 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20003 |
Maybe | None |
Office Online Server | 5002699 (Security Update) | Important | Remote Code Execution | 5002690 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20003 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-26642 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26640
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Digital Media Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker with low integrity level privileges who successfully exploited this vulnerability could gain medium integrity level privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26640 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26640 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26641
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26641 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Denial of Service | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Denial of Service | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Denial of Service | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Denial of Service | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Denial of Service | 5053599 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26641 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26644
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hello Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.1/TemporalScore:4.5
Executive Summary: Automated recognition mechanism with inadequate detection or handling of adversarial input perturbations in Windows Hello allows an unauthorized attacker to perform spoofing locally. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26644 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Spoofing | 5053596 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Spoofing | 5053596 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Spoofing | 5053606 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Spoofing | 5053606 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Spoofing | 5053606 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Spoofing | 5053606 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Spoofing | 5053606 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Spoofing | 5053606 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Spoofing | 5053602 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Spoofing | 5053602 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Spoofing | 5053602 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Spoofing | 5053602 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Spoofing | 5053598 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Spoofing | 5053598 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Spoofing | 5053596 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Spoofing | 5053596 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Spoofing | 5053598 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Spoofing | 5053598 |
Base: 5.1 Temporal: 4.5 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26644 | Hu Bowen with Nanyang Technological University Wang Kuo with Nanyang Technological University Chang Chip-Hong with Nanyang Technological University |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26648
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Sensitive data storage in improperly locked memory in Windows Kernel allows an authorized attacker to elevate privileges locally. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26648 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26648 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26649
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Secure Channel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain domain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26649 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26649 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26647
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kerberos Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: Improper input validation in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network. FAQ: How could an attacker exploit this vulnerability? An authenticated attacker could exploit this vulnerability by establishing a machine-in-the-middle (MITM) attack or other local network spoofing technique, then sending a malicious Kerberos message to the client victim machine to spoof itself as the Kerberos authentication server. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by compromising a publicly trusted Certificate Authority (CA), issuing a certificate with the desired Subject Key Identifier (SKI) value, and using that certificate to connect to the system, thereby assuming the identity of any account with a strong mapping using the SKI. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could be assigned much greater rights by the Key Distribution Center to the certificate than intended. Mitigations: To help protect your environment and prevent outages, we recommend the following steps:
For more information, please review: https://support.microsoft.com/help/5057784. Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26647 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26647 | Oscar Virot with Toriv AB |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26651
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Local Session Manager (LSM) Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Exposed dangerous method or function in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26651 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Denial of Service | 5053599 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26651 | Remco van der Meer |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26652
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26652 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26652 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26670
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. How could an attacker exploit this vulnerability? An unauthenticated attacker could sequentially send specially crafted requests to a vulnerable LDAP server. Successful exploitation could result in a use after free which could be leveraged to achieve remote code execution. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26670 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Critical | Remote Code Execution | None | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Critical | Remote Code Execution | None | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Critical | Remote Code Execution | 5053888 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Critical | Remote Code Execution | 5053888 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Critical | Remote Code Execution | 5053888 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Critical | Remote Code Execution | 5053888 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Critical | Remote Code Execution | 5053620 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Critical | Remote Code Execution | 5053620 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Critical | Remote Code Execution | 5053886 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Critical | Remote Code Execution | 5053886 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Critical | Remote Code Execution | 5053887 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Critical | Remote Code Execution | 5053887 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Critical | Remote Code Execution | 5053603 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Critical | Remote Code Execution | 5053603 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Critical | Remote Code Execution | 5053599 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26670 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26671
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. How could an attacker exploit this vulnerability? An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26671 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Remote Code Execution | 5053599 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26671 | ʌ!ɔ⊥ojv with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26674
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Media Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26674 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Remote Code Execution | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26674 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26672
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26672 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Information Disclosure | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Information Disclosure | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Information Disclosure | 5053599 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26672 | Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26673
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26673 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Denial of Service | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Denial of Service | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Denial of Service | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Denial of Service | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Denial of Service | 5053599 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26673 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26675
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Subsystem for Linux Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Out-of-bounds read in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26675 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26675 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26676
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26676 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Information Disclosure | 5053888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Information Disclosure | 5053620 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Information Disclosure | 5053886 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Information Disclosure | 5053887 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Information Disclosure | 5053599 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26676 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26678
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Defender Application Control Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Executive Summary: Improper access control in Windows Defender Application Control (WDAC) allows an unauthorized attacker to bypass a security feature locally. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploits this vulnerability could bypass Windows Defender Application Control (WDAC) enforcement. This could lead to the ability to run unauthorized applications on target systems. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by launching any executable that is allowed to launch by a per process rule. Once that executable is validly launched by the correct process, any restrictions on the executable are lifted; and it can be executed outside of the correct process. This bypasses the application control policy entirely Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26678 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Security Feature Bypass | 5053598 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Security Feature Bypass | 5053598 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Security Feature Bypass | 5053603 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Security Feature Bypass | 5053603 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Security Feature Bypass | 5053599 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Security Feature Bypass | 5053598 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Security Feature Bypass | 5053598 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26678 | Deven Bowers with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-26679
MITRE NVD Issuing CNA: Microsoft |
CVE Title: RPC Endpoint Mapper Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in RPC Endpoint Mapper Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could execute code in the security context of the “NT AUTHORITY\Network Service” account. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-26679 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-26679 | Zhang WangJunJie, He YiSheng with Hillstone Networks |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27467
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Digital Media Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited the vulnerability could elevate from a low integrity level up to a medium integrity level. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27467 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27467 | Dongjun Kim (smlijun) with Ajou University & ENKI WhiteHat |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27469
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27469 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Denial of Service | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Denial of Service | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Denial of Service | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Denial of Service | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Denial of Service | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Denial of Service | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Denial of Service | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Denial of Service | 5053599 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27469 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27485
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27485 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27485 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27484
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27484 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27484 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27480
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network. FAQ: How could an attacker exploit this vulnerability? An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27480 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 | 5055581 (Monthly Rollup) | Critical | Remote Code Execution | 5053886 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Critical | Remote Code Execution | 5053886 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Critical | Remote Code Execution | 5053887 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Critical | Remote Code Execution | 5053887 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Critical | Remote Code Execution | 5053603 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Critical | Remote Code Execution | 5053603 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Critical | Remote Code Execution | 5053599 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27480 | ʌ!ɔ⊥ojv with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27481
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Telephony Service Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Stack-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27481 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Remote Code Execution | 5053888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Remote Code Execution | 5053599 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27481 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27482
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. How could an attacker exploit this vulnerability? An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27482 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2016 | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Critical | Remote Code Execution | 5053603 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Critical | Remote Code Execution | 5053603 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Critical | Remote Code Execution | 5053599 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27482 | ʌ!ɔ⊥ojv with Kunlun Lab bee13oy with Cyber Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27483
MITRE NVD Issuing CNA: Microsoft |
CVE Title: NTFS Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability? An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27483 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27483 | Will Dormann with Vul Labs |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27487
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Remote Desktop Client Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of this vulnerability requires a user to remote into a server that is controlled by an attacker, which could then allow the server to execute a command on the user's machine without their consent. This scenario assumes that the user has the ability to remote into the server and that the server has been compromised to execute such commands upon connection. How could an attacker exploit this vulnerability? In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27487 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Remote Desktop client for Windows Desktop | Release Notes (Security Update) | Important | Remote Code Execution | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.2.6081.0 |
Maybe | None | |
Windows 10 for 32-bit Systems | Important | Remote Code Execution | None | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Remote Code Execution | None | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows App Client for Windows Desktop | Release Notes (Security Update) | Important | Remote Code Execution | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
2.0.379.0 |
Maybe | None | |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Remote Code Execution | 5053620 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Remote Code Execution | 5053886 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Remote Code Execution | 5053887 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Remote Code Execution | 5053594 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Remote Code Execution | 5053596 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Remote Code Execution | 5053603 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Remote Code Execution | 5053599 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27487 | Josh Watson with Microsoft Nicholas Vadasz with Microsoft Philemon Orphee Favrod with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27489
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Local Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper input validation in Azure Local allows an authorized attacker to elevate privileges locally. FAQ: What privileges would an attacker gain by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could load a non-Microsoft DLL into an enclave, potentially leading to code execution within the context of the target enclave. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27489 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Stack HCI OS 22H2 | 5055526 (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3328 |
Yes | None | |
Azure Stack HCI OS 23H2 | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1486 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27489 | Microsoft Offensive Research & Security Engineering |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27486
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27486 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Denial of Service | 5053887 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Denial of Service | 5053594 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Denial of Service | 5053596 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Denial of Service | 5053603 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Denial of Service | 5053598 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27486 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27492
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Secure Channel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain domain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27492 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27492 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27491
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: Use after free in Windows Hyper-V allows an authorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with guest privileges must send a victim a malicious site and convince them to open it. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27491 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Critical | Remote Code Execution | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Critical | Remote Code Execution | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Critical | Remote Code Execution | 5053606 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Critical | Remote Code Execution | 5053602 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Critical | Remote Code Execution | 5053594 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Critical | Remote Code Execution | 5053596 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Critical | Remote Code Execution | 5053603 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Critical | Remote Code Execution | 5053603 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Critical | Remote Code Execution | 5053599 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Critical | Remote Code Execution | 5053598 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27491 | Chief Banana |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27490
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Bluetooth Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could create or delete files in the security context of the “NT AUTHORITY\ LOCAL SERVICE” account. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27490 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27490 | Erik Peterson with Microsoft Corporation Robert Zhao and Erik Peterson with Microsoft Corporation |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27727
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Installer Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27727 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27727 | Simon (@sim0nsecurity) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27729
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Shell Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows Shell allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27729 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Remote Code Execution | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Remote Code Execution | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Remote Code Execution | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27729 | Lewis Lee |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27728
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Out-of-bounds read in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27728 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27728 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27731
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OpenSSH for Windows Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper input validation in OpenSSH for Windows allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27731 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27731 | Jordan Borean |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27730
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Digital Media Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited the vulnerability could elevate from a low integrity level up to a medium integrity level. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27730 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27730 | Dongjun Kim (smlijun) with Ajou University & ENKI WhiteHat |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27732
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Graphics Component Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27732 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Elevation of Privilege | 5053606 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Elevation of Privilege | 5053602 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Elevation of Privilege | 5053603 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Elevation of Privilege | 5053599 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Elevation of Privilege | 5053598 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27732 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27733
MITRE NVD Issuing CNA: Microsoft |
CVE Title: NTFS Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally. FAQ: Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability? An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27733 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) |
Important | Elevation of Privilege | 5053888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Elevation of Privilege | 5053620 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055581 (Monthly Rollup) | Important | Elevation of Privilege | 5053886 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5055557 (Monthly Rollup) | Important | Elevation of Privilege | 5053887 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22523 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Elevation of Privilege | 5053594 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Elevation of Privilege | 5053596 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27733 | Will Dormann with Vul Labs |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27735
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.0/TemporalScore:5.2
Executive Summary: Insufficient verification of data authenticity in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to bypass a security feature locally. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass the Virtualization-based Security feature. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27735 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Security Feature Bypass | None | Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Security Feature Bypass | None | Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Security Feature Bypass | 5053594 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Security Feature Bypass | 5053594 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Security Feature Bypass | 5053598 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Security Feature Bypass | 5053598 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Security Feature Bypass | 5053594 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Security Feature Bypass | 5053594 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Security Feature Bypass | 5053603 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Security Feature Bypass | 5053603 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Security Feature Bypass | 5053599 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Security Feature Bypass | 5053598 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Security Feature Bypass | 5053598 |
Base: 6.0 Temporal: 5.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27735 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27736
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Power Dependency Coordinator Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows Power Dependency Coordinator allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27736 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Information Disclosure | 5053606 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Information Disclosure | 5053602 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2016 | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5055521 (Security Update) | Important | Information Disclosure | 5053594 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows Server 2019 | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5055519 (Security Update) | Important | Information Disclosure | 5053596 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows Server 2022 | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5055526 (Security Update) | Important | Information Disclosure | 5053603 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.3454 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5055527 (Security Update) | Important | Information Disclosure | 5053599 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1551 |
Yes | None |
Windows Server 2025 | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5055523 (Security Update) | Important | Information Disclosure | 5053598 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-27736 | Microsoft Offensive Research & Security Engineering |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-27737
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Security Zone Mapping Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.6/TemporalScore:7.5
Executive Summary: Improper input validation in Windows Security Zone Mapping allows an unauthorized attacker to bypass a security feature locally. FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment. The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2? While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms. To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability. Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available? The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. What kind of security feature could be bypassed by successfully exploiting this vulnerability? A URL path could be constructed by an attacker in such a way that the URL’s Zone is interpreted as belonging to a more privileged zone According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. Mitigations: None Workarounds: None Revision: 1.0    08-Apr-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-27737 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | Important | Security Feature Bypass | None | Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 for x64-based Systems | Important | Security Feature Bypass | None | Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for 32-bit Systems | 5055521 (Security Update) | Important | Security Feature Bypass | 5053594 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5055521 (Security Update) | Important | Security Feature Bypass | 5053594 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7970 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5055519 (Security Update) | Important | Security Feature Bypass | 5053596 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7137 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.5737 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5055518 (Security Update) | Important | Security Feature Bypass | 5053606 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.5737 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5191 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5055528 (Security Update) | Important | Security Feature Bypass | 5053602 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5191 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5055523 (Security Update) | Important | Security Feature Bypass | 5053598 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5055523 (Security Update) | Important | Security Feature Bypass | 5053598 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.3775 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) 5055515 (IE Cumulative) |
Important | Security Feature Bypass | 5053888 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 1.000 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) 5055515 (IE Cumulative) |
Important | Security Feature Bypass | 5053888 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 1.000 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5055609 (Monthly Rollup) 5055596 (Security Only) 5055515 (IE Cumulative) |
Important | Security Feature Bypass | 5053888 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 1.000 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5055609 (Monthly Rollup) 5055596 (Security Only) 5055515 (IE Cumulative) |
Important | Security Feature Bypass | 5053888 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23220 1.000 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5055515 (IE Cumulative) 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Security Feature Bypass | 5053620 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.000 6.1.7601.27670 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5055515 (IE Cumulative) 5055561 (Monthly Rollup) 5055570 (Security Only) |
Important | Security Feature Bypass | 5053620 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.000 6.1.7601.27670 |
Yes | None |
Windows Server 2012 | 5055515 (IE Cumulative) 5055581 (Monthly Rollup) |
Important | Security Feature Bypass | 5053886 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.000 6.2.9200.25423 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5055515 (IE Cumulative) 5055581 (Monthly Rollup) |
Important | Security Feature Bypass | 5053886 |
Base: 8.6 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.000 6.2.9200.25423 |
Yes | None |
Windows Server 2012 R2 | 5055515 (IE Cumulative) 5055557 (Monthly Rollup) |
Important | Security Feature Bypas |