Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
MicrosoftActive Directory Domain Services CVE-2025-29810 Active Directory Domain Services Elevation of Privilege Vulnerability
MicrosoftASP.NET Core CVE-2025-26682 ASP.NET Core and Visual Studio Denial of Service Vulnerability
MicrosoftAzure Local CVE-2025-27489 Azure Local Elevation of Privilege Vulnerability
MicrosoftAzure Local Cluster CVE-2025-26628 Azure Local Cluster Information Disclosure Vulnerability
MicrosoftAzure Local Cluster CVE-2025-25002 Azure Local Cluster Information Disclosure Vulnerability
MicrosoftAzure Portal Windows Admin Center CVE-2025-29819 Windows Admin Center in Azure Portal Information Disclosure Vulnerability
MicrosoftDynamics Business Central CVE-2025-29821 Microsoft Dynamics Business Central Information Disclosure Vulnerability
security@golang.orgMariner CVE-2024-45338 Unknown
support@hackerone.comMariner CVE-2024-21896 Unknown
security@golang.orgMariner CVE-2023-45288 Unknown
security-advisories@github.comMariner CVE-2024-45310 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-54680 Unknown
secalert@redhat.comMariner CVE-2024-10041 Unknown
security-advisories@github.comMariner CVE-2024-51744 Unknown
security-advisories@github.comMariner CVE-2025-27144 Unknown
report@snyk.ioMariner CVE-2021-23336 Unknown
secalert@redhat.comMariner CVE-2012-2677 Unknown
cve@mitre.orgMariner CVE-2019-20907 Unknown
security@apache.orgMariner CVE-2024-52338 Unknown
cve@mitre.orgMariner CVE-2020-22217 Unknown
secalert@redhat.comMariner CVE-2021-3672 Unknown
security@php.netMariner CVE-2025-1736 Unknown
security@php.netMariner CVE-2025-1734 Unknown
security@hashicorp.comMariner CVE-2024-6104 Unknown
cve@mitre.orgMariner CVE-2019-9674 Unknown
cve@mitre.orgMariner CVE-2007-4559 Unknown
security@php.netMariner CVE-2025-1861 Unknown
cve@mitre.orgMariner CVE-2012-6708 Unknown
cve@mitre.orgMariner CVE-2015-9251 Unknown
cve_disclosure@tech.gov.sgMariner CVE-2025-1744 Unknown
security@php.netMariner CVE-2025-1219 Unknown
cve@mitre.orgMariner CVE-2017-17522 Unknown
cve@mitre.orgMariner CVE-2017-18207 Unknown
cve@mitre.orgMariner CVE-2025-24855 Unknown
secalert_us@oracle.comMariner CVE-2025-21490 Unknown
secure@intel.comMariner CVE-2019-14584 Unknown
security-advisories@github.comMariner CVE-2024-34062 Unknown
security-advisories@github.comMariner CVE-2024-52006 Unknown
security-advisories@github.comMariner CVE-2025-29923 Unknown
cve-coordination@google.comMariner CVE-2021-22569 Unknown
security@golang.orgMariner CVE-2025-22870 Unknown
secalert@redhat.comMariner CVE-2024-3727 Unknown
support@hackerone.comMariner CVE-2024-22019 Unknown
cve@mitre.orgMariner CVE-2024-52949 Unknown
secalert@redhat.comMariner CVE-2023-40546 Unknown
security-advisories@github.comMariner CVE-2025-30204 Unknown
security@golang.orgMariner CVE-2022-32149 Unknown
security@php.netMariner CVE-2025-1217 Unknown
secalert@redhat.comMariner CVE-2023-1393 Unknown
cve@mitre.orgMariner CVE-2024-37535 Unknown
security@ubuntu.comMariner CVE-2022-28737 Unknown
security-advisories@github.comMariner CVE-2024-25629 Unknown
cve@mitre.orgMariner CVE-2022-40898 Unknown
security@golang.orgMariner CVE-2024-45337 Unknown
secalert@redhat.comMariner CVE-2023-40548 Unknown
security@huntr.devMariner CVE-2024-7776 Unknown
secalert@redhat.comMariner CVE-2024-7383 Unknown
secalert@redhat.comMariner CVE-2021-20277 Unknown
cve@mitre.orgMariner CVE-2024-31745 Unknown
cve@mitre.orgMariner CVE-2024-55549 Unknown
secalert@redhat.comMariner CVE-2021-20286 Unknown
secalert@redhat.comMariner CVE-2023-40550 Unknown
cve@mitre.orgMariner CVE-2023-30570 Unknown
cve-assign@fb.comMariner CVE-2021-24032 Unknown
secalert@redhat.comMariner CVE-2023-40549 Unknown
security@libreswan.orgMariner CVE-2024-3652 Unknown
secalert@redhat.comMariner CVE-2024-2002 Unknown
secalert@redhat.comMariner CVE-2020-27840 Unknown
secalert@redhat.comMariner CVE-2022-32746 Unknown
secalert@redhat.comMariner CVE-2019-3816 Unknown
secalert@redhat.comMariner CVE-2019-3833 Unknown
security-advisories@github.comMariner CVE-2024-32021 Unknown
security-advisories@github.comMariner CVE-2024-50349 Unknown
security-advisories@github.comMariner CVE-2024-32465 Unknown
security-advisories@github.comMariner CVE-2024-32020 Unknown
MicrosoftMicrosoft AutoUpdate (MAU) CVE-2025-29800 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
MicrosoftMicrosoft AutoUpdate (MAU) CVE-2025-29801 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2025-3073 Chromium: CVE-2025-3073 Inappropriate implementation in Autofill
ChromeMicrosoft Edge (Chromium-based) CVE-2025-3068 Chromium: CVE-2025-3068 Inappropriate implementation in Intents
ChromeMicrosoft Edge (Chromium-based) CVE-2025-3074 Chromium: CVE-2025-3074 Inappropriate implementation in Downloads
ChromeMicrosoft Edge (Chromium-based) CVE-2025-3067 Chromium: CVE-2025-3067 Inappropriate implementation in Custom Tabs
ChromeMicrosoft Edge (Chromium-based) CVE-2025-3071 Chromium: CVE-2025-3071 Inappropriate implementation in Navigations
ChromeMicrosoft Edge (Chromium-based) CVE-2025-3072 Chromium: CVE-2025-3072 Inappropriate implementation in Custom Tabs
ChromeMicrosoft Edge (Chromium-based) CVE-2025-3070 Chromium: CVE-2025-3070 Insufficient validation of untrusted input in Extensions
ChromeMicrosoft Edge (Chromium-based) CVE-2025-3069 Chromium: CVE-2025-3069 Inappropriate implementation in Extensions
MicrosoftMicrosoft Edge (Chromium-based) CVE-2025-25000 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
MicrosoftMicrosoft Edge (Chromium-based) CVE-2025-29815 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
MicrosoftMicrosoft Edge (Chromium-based) CVE-2025-25001 Microsoft Edge for iOS Spoofing Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2025-3066 Chromium: CVE-2025-3066 Use after free in Navigations
MicrosoftMicrosoft Edge for iOS CVE-2025-29796 Microsoft Edge for iOS Spoofing Vulnerability
MicrosoftMicrosoft Office CVE-2025-27745 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-27744 Microsoft Office Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office CVE-2025-26642 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-29792 Microsoft Office Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office CVE-2025-29791 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-27748 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-27746 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2025-27749 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-27751 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-27750 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-29823 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2025-27752 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office OneNote CVE-2025-29822 Microsoft OneNote Security Feature Bypass Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2025-29794 Microsoft SharePoint Remote Code Execution Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2025-29793 Microsoft SharePoint Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-27747 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-29816 Microsoft Word Security Feature Bypass Vulnerability
MicrosoftMicrosoft Office Word CVE-2025-29820 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Streaming Service CVE-2025-27471 Microsoft Streaming Service Denial of Service Vulnerability
MicrosoftMicrosoft Virtual Hard Drive CVE-2025-26688 Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
MicrosoftOpenSSH for Windows CVE-2025-27731 Microsoft OpenSSH for Windows Elevation of Privilege Vulnerability
MicrosoftOutlook for Android CVE-2025-29805 Outlook for Android Information Disclosure Vulnerability
MicrosoftRemote Desktop Client CVE-2025-27487 Remote Desktop Client Remote Code Execution Vulnerability
MicrosoftRemote Desktop Gateway Service CVE-2025-27482 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftRemote Desktop Gateway Service CVE-2025-27480 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftRPC Endpoint Mapper Service CVE-2025-26679 RPC Endpoint Mapper Service Elevation of Privilege Vulnerability
MicrosoftSystem Center CVE-2025-27743 Microsoft System Center Elevation of Privilege Vulnerability
MicrosoftVisual Studio CVE-2025-29802 Visual Studio Elevation of Privilege Vulnerability
MicrosoftVisual Studio CVE-2025-29804 Visual Studio Elevation of Privilege Vulnerability
MicrosoftVisual Studio Code CVE-2025-20570 Visual Studio Code Elevation of Privilege Vulnerability
MicrosoftVisual Studio Tools for Applications and SQL Server Management Studio CVE-2025-29803 Visual Studio Tools for Applications and SQL Server Management Studio Elevation of Privilege Vulnerability
MicrosoftWindows Active Directory Certificate Services CVE-2025-27740 Active Directory Certificate Services Elevation of Privilege Vulnerability
MicrosoftWindows BitLocker CVE-2025-26637 BitLocker Security Feature Bypass Vulnerability
MicrosoftWindows Bluetooth Service CVE-2025-27490 Windows Bluetooth Service Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2025-29824 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Cryptographic Services CVE-2025-29808 Windows Cryptographic Services Information Disclosure Vulnerability
MicrosoftWindows Cryptographic Services CVE-2025-26641 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
MicrosoftWindows Defender Application Control (WDAC) CVE-2025-26678 Windows Defender Application Control Security Feature Bypass Vulnerability
MicrosoftWindows Digital Media CVE-2025-27730 Windows Digital Media Elevation of Privilege Vulnerability
MicrosoftWindows Digital Media CVE-2025-27467 Windows Digital Media Elevation of Privilege Vulnerability
MicrosoftWindows Digital Media CVE-2025-26640 Windows Digital Media Elevation of Privilege Vulnerability
MicrosoftWindows Digital Media CVE-2025-27476 Windows Digital Media Elevation of Privilege Vulnerability
MicrosoftWindows DWM Core Library CVE-2025-24074 Microsoft DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows DWM Core Library CVE-2025-24073 Microsoft DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows DWM Core Library CVE-2025-24058 Windows DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows DWM Core Library CVE-2025-24062 Microsoft DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows DWM Core Library CVE-2025-24060 Microsoft DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows Hello CVE-2025-26635 Windows Hello Security Feature Bypass Vulnerability
MicrosoftWindows Hello CVE-2025-26644 Windows Hello Spoofing Vulnerability
MicrosoftWindows HTTP.sys CVE-2025-27473 HTTP.sys Denial of Service Vulnerability
MicrosoftWindows Hyper-V CVE-2025-27491 Windows Hyper-V Remote Code Execution Vulnerability
MicrosoftWindows Installer CVE-2025-27727 Windows Installer Elevation of Privilege Vulnerability
MicrosoftWindows Kerberos CVE-2025-26647 Windows Kerberos Elevation of Privilege Vulnerability
MicrosoftWindows Kerberos CVE-2025-27479 Kerberos Key Distribution Proxy Service Denial of Service Vulnerability
MicrosoftWindows Kerberos CVE-2025-29809 Windows Kerberos Security Feature Bypass Vulnerability
MicrosoftWindows Kernel CVE-2025-26648 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2025-27739 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel Memory CVE-2025-29812 DirectX Graphics Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel-Mode Drivers CVE-2025-27728 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
MicrosoftWindows LDAP - Lightweight Directory Access Protocol CVE-2025-26673 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
MicrosoftWindows LDAP - Lightweight Directory Access Protocol CVE-2025-26663 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
MicrosoftWindows LDAP - Lightweight Directory Access Protocol CVE-2025-27469 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
MicrosoftWindows LDAP - Lightweight Directory Access Protocol CVE-2025-26670 Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability
MicrosoftWindows Local Security Authority (LSA) CVE-2025-21191 Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
MicrosoftWindows Local Security Authority (LSA) CVE-2025-27478 Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
MicrosoftWindows Local Session Manager (LSM) CVE-2025-26651 Windows Local Session Manager (LSM) Denial of Service Vulnerability
MicrosoftWindows Mark of the Web (MOTW) CVE-2025-27472 Windows Mark of the Web Security Feature Bypass Vulnerability
MicrosoftWindows Media CVE-2025-26666 Windows Media Remote Code Execution Vulnerability
MicrosoftWindows Media CVE-2025-26674 Windows Media Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2025-29811 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
MicrosoftWindows NTFS CVE-2025-27742 NTFS Information Disclosure Vulnerability
MicrosoftWindows NTFS CVE-2025-21197 Windows NTFS Information Disclosure Vulnerability
MicrosoftWindows NTFS CVE-2025-27741 NTFS Elevation of Privilege Vulnerability
MicrosoftWindows NTFS CVE-2025-27483 NTFS Elevation of Privilege Vulnerability
MicrosoftWindows NTFS CVE-2025-27733 NTFS Elevation of Privilege Vulnerability
MicrosoftWindows Power Dependency Coordinator CVE-2025-27736 Windows Power Dependency Coordinator Information Disclosure Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2025-26671 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftWindows Resilient File System (ReFS) CVE-2025-27738 Windows Resilient File System (ReFS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-27474 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-21203 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-26668 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-26667 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-26664 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-26672 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-26669 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2025-26676 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Secure Channel CVE-2025-27492 Windows Secure Channel Elevation of Privilege Vulnerability
MicrosoftWindows Secure Channel CVE-2025-26649 Windows Secure Channel Elevation of Privilege Vulnerability
MicrosoftWindows Security Zone Mapping CVE-2025-27737 Windows Security Zone Mapping Security Feature Bypass Vulnerability
MicrosoftWindows Shell CVE-2025-27729 Windows Shell Remote Code Execution Vulnerability
MicrosoftWindows Standards-Based Storage Management Service CVE-2025-27485 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
MicrosoftWindows Standards-Based Storage Management Service CVE-2025-27486 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
MicrosoftWindows Standards-Based Storage Management Service CVE-2025-21174 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
MicrosoftWindows Standards-Based Storage Management Service CVE-2025-26680 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
MicrosoftWindows Standards-Based Storage Management Service CVE-2025-27470 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
MicrosoftWindows Standards-Based Storage Management Service CVE-2025-26652 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
MicrosoftWindows Subsystem for Linux CVE-2025-26675 Windows Subsystem for Linux Elevation of Privilege Vulnerability
MicrosoftWindows TCP/IP CVE-2025-26686 Windows TCP/IP Remote Code Execution Vulnerability
MicrosoftWindows Telephony Service CVE-2025-27481 Windows Telephony Service Remote Code Execution Vulnerability
MicrosoftWindows Telephony Service CVE-2025-21222 Windows Telephony Service Remote Code Execution Vulnerability
MicrosoftWindows Telephony Service CVE-2025-21205 Windows Telephony Service Remote Code Execution Vulnerability
MicrosoftWindows Telephony Service CVE-2025-21221 Windows Telephony Service Remote Code Execution Vulnerability
MicrosoftWindows Telephony Service CVE-2025-27477 Windows Telephony Service Remote Code Execution Vulnerability
MicrosoftWindows Universal Plug and Play (UPnP) Device Host CVE-2025-27484 Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability
MicrosoftWindows Update Stack CVE-2025-21204 Windows Process Activation Elevation of Privilege Vulnerability
MicrosoftWindows Update Stack CVE-2025-27475 Windows Update Stack Elevation of Privilege Vulnerability
MicrosoftWindows upnphost.dll CVE-2025-26665 Windows upnphost.dll Elevation of Privilege Vulnerability
MicrosoftWindows USB Print Driver CVE-2025-26639 Windows USB Print Driver Elevation of Privilege Vulnerability
MicrosoftWindows Virtualization-Based Security (VBS) Enclave CVE-2025-27735 Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
MicrosoftWindows Win32K - GRFX CVE-2025-27732 Windows Graphics Component Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - GRFX CVE-2025-26687 Win32k Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - GRFX CVE-2025-26681 Win32k Elevation of Privilege Vulnerability

CVE-2025-26663 - Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26663
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


How could an attacker exploit this vulnerability?

An unauthenticated attacker could sequentially send specially crafted requests to a vulnerable LDAP server. Successful exploitation could result in a use after free which could be leveraged to achieve remote code execution.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26663
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Critical Remote Code Execution None Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Critical Remote Code Execution None Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Critical Remote Code Execution 5053606
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Critical Remote Code Execution 5053606
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Critical Remote Code Execution 5053606
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Critical Remote Code Execution
5053606
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Critical Remote Code Execution
5053606
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Critical Remote Code Execution
5053606
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Critical Remote Code Execution 5053602
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Critical Remote Code Execution 5053602
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Critical Remote Code Execution 5053602
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Critical Remote Code Execution
5053602
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Critical Remote Code Execution 5053888
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Critical Remote Code Execution 5053888
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Critical Remote Code Execution 5053888
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Critical Remote Code Execution 5053888
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Critical Remote Code Execution 5053620
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Critical Remote Code Execution 5053620
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Critical Remote Code Execution 5053886
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Critical Remote Code Execution 5053886
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Critical Remote Code Execution 5053887
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Critical Remote Code Execution 5053887
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Critical Remote Code Execution 5053603
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Critical Remote Code Execution 5053603
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Critical Remote Code Execution 5053599
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26663 Kunlun Lab with https://www.cyberkl.com/


CVE-2025-26664 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26664
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26664
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Information Disclosure 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Information Disclosure 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Information Disclosure 5053599
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26664 Anonymous


CVE-2025-26665 - Windows upnphost.dll Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26665
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows upnphost.dll Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Sensitive data storage in improperly locked memory in Windows upnphost.dll allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26665
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26665 k0shl with Kunlun Lab


CVE-2025-26666 - Windows Media Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26666
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Media Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally.


FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26666
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2019 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Remote Code Execution 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26666 Anonymous


CVE-2025-26669 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26669
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26669
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Information Disclosure None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Information Disclosure None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Information Disclosure 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Information Disclosure 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Information Disclosure 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Information Disclosure 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Information Disclosure
5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Information Disclosure 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Information Disclosure 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Information Disclosure 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Information Disclosure 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Information Disclosure 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Information Disclosure 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Information Disclosure 5053603
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Information Disclosure 5053603
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Information Disclosure 5053599
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Information Disclosure 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Information Disclosure 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26669 Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group


CVE-2025-26667 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26667
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26667
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Information Disclosure 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Information Disclosure 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Information Disclosure 5053599
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26667 Anonymous


CVE-2025-26668 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26668
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26668
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution
5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Remote Code Execution 5053599
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26668 Anonymous


CVE-2025-26681 - Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26681
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:6.0
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An authenticated user needs to interact with a malicious printer.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26681
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 6.7
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26681 Anonymous


CVE-2025-26680 - Windows Standards-Based Storage Management Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26680
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26680
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2025 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26680 Azure Yang with Kunlun Lab


CVE-2025-26686 - Windows TCP/IP Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26686
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows TCP/IP Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Sensitive data storage in improperly locked memory in Windows TCP/IP allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition and also to take additional actions prior to exploitation to prepare the target environment.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metrics, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection to send a DHCPv6 request. The attacker could then send a DHCPv6 reply with a fake IPv6 address.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26686
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Critical Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Critical Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Critical Remote Code Execution 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Critical Remote Code Execution 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Critical Remote Code Execution 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Critical Remote Code Execution
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Critical Remote Code Execution
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Critical Remote Code Execution
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Critical Remote Code Execution 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Critical Remote Code Execution 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Critical Remote Code Execution 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Critical Remote Code Execution
5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Critical Remote Code Execution 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Critical Remote Code Execution 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Critical Remote Code Execution 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Critical Remote Code Execution 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Critical Remote Code Execution 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Critical Remote Code Execution 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Critical Remote Code Execution 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Critical Remote Code Execution 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Critical Remote Code Execution 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Critical Remote Code Execution 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Critical Remote Code Execution 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Critical Remote Code Execution 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Critical Remote Code Execution 5053599
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26686 @TrueUnitySect


CVE-2025-26687 - Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26687
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Win32K - GRFX allows an unauthorized attacker to elevate privileges over a network.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26687
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Office for Android Release Notes (Security Update) Important Elevation of Privilege Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.18730.20000
Maybe None
Microsoft Office for Universal Release Notes (Security Update) Important Elevation of Privilege Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.14326.22331
Maybe None
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26687 Anonymous


CVE-2025-26688 - Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26688
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Stack-based buffer overflow in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26688
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26688 DongJun Kim with Enki WhiteHat


Jongseong Kim with Enki WhiteHat


CVE-2025-27471 - Microsoft Streaming Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27471
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Streaming Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.2
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Sensitive data storage in improperly locked memory in Microsoft Streaming Service allows an unauthorized attacker to deny service over a network.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27471
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Denial of Service None Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Denial of Service None Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Denial of Service 5053594
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Denial of Service 5053594
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Denial of Service 5053596
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Denial of Service 5053596
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Denial of Service
5053602
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Denial of Service 5053598
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Denial of Service 5053598
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Denial of Service 5053620
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Denial of Service 5053620
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Denial of Service 5053886
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Denial of Service 5053886
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Denial of Service 5053594
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Denial of Service 5053594
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Denial of Service 5053596
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Denial of Service 5053596
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Denial of Service 5053603
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Denial of Service 5053603
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Denial of Service 5053599
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Denial of Service 5053598
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Denial of Service 5053598
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27471 k0shl with Kunlun Lab


Zhiniang Peng with HUST


CVE-2025-27470 - Windows Standards-Based Storage Management Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27470
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27470
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2025 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27470 k0shl with Kunlun Lab


CVE-2025-27473 - HTTP.sys Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27473
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: HTTP.sys Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled resource consumption in Windows HTTP.sys allows an unauthorized attacker to deny service over a network.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27473
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Denial of Service
5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Denial of Service 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Denial of Service 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Denial of Service 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Denial of Service 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Denial of Service 5053599
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27473 k0shl with Kunlun Lab


CVE-2025-27472 - Windows Mark of the Web Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27472
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mark of the Web Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:4.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Protection mechanism failure in Windows Mark of the Web (MOTW) allows an unauthorized attacker to bypass a security feature over a network.


FAQ:

According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L) and some loss of availability (A:L). What does that mean for this vulnerability?

An attacker can craft a malicious file that would evade Mark of the Web (MOTW) defenses, resulting in a limited loss of integrity and availability of security features such as SmartScreen Application Reputation security check and/or the legacy Windows Attachment Services security prompt.


How could an attacker exploit the vulnerability?

To exploit this vulnerability, an attacker could host a file on an attacker-controlled server, then convince a targeted user to download and open the file. This could allow the attacker to interfere with the Mark of the Web functionality.

Please see Additional information about Mark of the Web for further clarification


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27472
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Security Feature Bypass None Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Security Feature Bypass None Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
Unknown Unknown None
Windows Server 2012 5055581 (Monthly Rollup) Important Security Feature Bypass 5053886
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Security Feature Bypass 5053886
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Security Feature Bypass 5053887
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Security Feature Bypass 5053887
Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C
6.3.9600.22523
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27472 Blaz Satler with 0patch by ACROS Security


CVE-2025-27474 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27474
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27474
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Information Disclosure 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Information Disclosure 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Information Disclosure 5053599
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27474 Anonymous


CVE-2025-27476 - Windows Digital Media Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27476
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Digital Media Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27476
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27476 Dongjun Kim (smlijun) with Ajou University & ENKI WhiteHat


CVE-2025-27475 - Windows Update Stack Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27475
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Update Stack Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Sensitive data storage in improperly locked memory in Windows Update Stack allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27475
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27475 Jongseong Kim (nevul37) with Ajou University, and working at ENKI WhiteHat


CVE-2025-27477 - Windows Telephony Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27477
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Telephony Service Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.


FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27477
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution
5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Remote Code Execution 5053599
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27477 Anonymous


CVE-2025-27478 - Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27478
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27478
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27478 Anonymous


CVE-2025-27479 - Kerberos Key Distribution Proxy Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27479
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kerberos Key Distribution Proxy Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Insufficient resource pool in Windows Kerberos allows an unauthorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27479
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5055581 (Monthly Rollup) Important Denial of Service 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Denial of Service 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Denial of Service 5053599
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27479 k0shl with Kunlun Lab


CVE-2025-27740 - Active Directory Certificate Services Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27740
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Active Directory Certificate Services Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Weak authentication in Windows Active Directory Certificate Services allows an authorized attacker to elevate privileges over a network.


FAQ:

How could an attacker exploit this vulnerability?

An authenticated user could manipulate attributes on computer accounts they own or manage, and acquire a certificate from Active Directory Certificate Services that would allow elevation of privilege to System.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain domain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27740
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27740

Konstantin Ruhmann with Volkswagen Financial Services AG


Konstantin Ruhmann with Volkswagen Financial Services AG


CVE-2025-27741 - NTFS Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27741
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NTFS Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27741
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27741 Will Dormann with Vul Labs


CVE-2025-27744 - Microsoft Office Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27744
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Microsoft Office allows an authorized attacker to elevate privileges locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27744
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Office 2016 (64-bit edition) 5002669 (Security Update) Important Elevation of Privilege 2920716
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1000
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27744 Simon (@sim0nsecurity)


CVE-2025-27742 - NTFS Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27742
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NTFS Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows NTFS allows an unauthorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27742
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Information Disclosure 5053594
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Information Disclosure 5053594
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Information Disclosure 5053596
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Information Disclosure 5053596
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Information Disclosure
5053602
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Information Disclosure 5053598
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Information Disclosure 5053598
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Information Disclosure 5053594
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Information Disclosure 5053594
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Information Disclosure 5053596
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Information Disclosure 5053596
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Information Disclosure 5053603
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Information Disclosure 5053603
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Information Disclosure 5053599
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Information Disclosure 5053598
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Information Disclosure 5053598
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27742 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2025-27745 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27745
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Are the updates for the Microsoft Office LTSC for Mac currently available?

The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27745
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002700 (Security Update) Critical Remote Code Execution 5002693
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Office 2016 (64-bit edition) 5002700 (Security Update) Critical Remote Code Execution 5002693
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC for Mac 2024 Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27745 0x140ce(Peace & Love)


CVE-2025-27746 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27746
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Are the updates for the Microsoft Office LTSC for Mac currently available?

The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27746
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 4484432 (Security Update) Important Remote Code Execution 4018319
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1000
Maybe None
Microsoft Office 2016 (64-bit edition) 4484432 (Security Update) Important Remote Code Execution 4018319
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC for Mac 2024 Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Office Online Server 5002699 (Security Update) Important Remote Code Execution 5002690
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20003
Maybe None
SharePoint Server Subscription Edition Language Pack 5002680 (Security Update) Important Remote Code Execution 5002667
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20003
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27746 Li Shuang and willJ with Vulnerability Research Institute


CVE-2025-27748 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27748
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Are the updates for the Microsoft Office LTSC for Mac currently available?

The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27748
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002700 (Security Update) Critical Remote Code Execution 5002693
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Office 2016 (64-bit edition) 5002700 (Security Update) Critical Remote Code Execution 5002693
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC for Mac 2024 Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27748 0x140ce


CVE-2025-27747 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27747
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Are the updates for the Microsoft Office LTSC for Mac currently available?

The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27747
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC for Mac 2024 Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft SharePoint Enterprise Server 2016 5002692 (Security Update)
5002682 (Security Update)
Important Remote Code Execution 5002685

5002671
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft SharePoint Server 2019 5002691 (Security Update)
5002680 (Security Update)
Important Remote Code Execution 5002678

5002667
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20003
Maybe None
Microsoft Word 2016 (32-bit edition) 5002702 (Security Update) Important Remote Code Execution 5002662
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Word 2016 (64-bit edition) 5002702 (Security Update) Important Remote Code Execution 5002662
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27747 Zhiniang Peng with HUST


CVE-2025-27749 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27749
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Are the updates for the Microsoft Office LTSC for Mac currently available?

The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27749
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002700 (Security Update) Critical Remote Code Execution 5002693
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Office 2016 (64-bit edition) 5002700 (Security Update) Critical Remote Code Execution 5002693
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: N/A
Temporal: N/A
Vector: N/A
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: N/A
Temporal: N/A
Vector: N/A
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC for Mac 2024 Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27749 0x140ce


CVE-2025-27743 - Microsoft System Center Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27743
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft System Center Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Untrusted search path in System Center allows an authorized attacker to elevate privileges locally.


FAQ:

What Microsoft System Center Products are affected by this vulnerability?

This vulnerability affects the following products under the Microsoft System Center:

  • System Center Operations Manager
  • System Center Service Manager
  • System Center Orchestrator
  • System Center Data protection Manager
  • System Center Virtual Machine Manager

For more information about these products see System Center documentation.


Will the product version change with the new installation media?

No. The RTM version of all System Center products remain unchanged. There's no change in the product version.

What existing System Center deployments are affected by this vulnerability?

There are no existing System Center deployments impacted by this vulnerability. However, it is recommended that users delete the existing installer setup files (.exe) and then download the latest version of their System Center product (.ZIP) found in the table below.

Product Download
System Center Virtual Machine Manager 2022 https://go.microsoft.com/fwlink/p/?LinkID=2195845
System Center Virtual Machine Manager 2019 https://go.microsoft.com/fwlink/p/?LinkID=2195725
System Center Virtual Machine Manager 2025 https://go.microsoft.com/fwlink/?linkid=2292412
System Center Data Protection Manager 2025 https://go.microsoft.com/fwlink/?linkid=2292311
System Center Data Protection Manager 2022 https://go.microsoft.com/fwlink/p/?LinkID=2195847
System Center Data Protection Manager 2019 https://go.microsoft.com/fwlink/p/?LinkID=2195851
System Center Orchestrator 2019 https://go.microsoft.com/fwlink/p/?LinkID=2195848
System Center Orchestrator 2022 https://go.microsoft.com/fwlink/p/?LinkID=2195531
System Center Orchestrator 2025 https://go.microsoft.com/fwlink/?linkid=2292411
System Center Service Manager 2019 https://go.microsoft.com/fwlink/p/?LinkID=2195849
System Center Service Manager 2022 https://go.microsoft.com/fwlink/p/?LinkID=2195846
System Center Service Manager 2025 https://go.microsoft.com/fwlink/?linkid=2292310
System Center Operations Manager 2019 https://go.microsoft.com/fwlink/p/?LinkID=2195532
System Center Operations Manager 2022 https://go.microsoft.com/fwlink/p/?LinkID=2195530
System Center Operations Manager 2025 https://go.microsoft.com/fwlink/?linkid=2292308

What actions do customers need to take to protect themselves from this vulnerability?

Only customers who re-use existing System Center installer files (.exe) files to deploy new instances in their environment are affected by this vulnerability. Customers performing installations in this manner must delete the existing installer setup files (.exe) and then download the latest version of their System Center product linked in the following table.

Customers who download new versions of the setup files (.ZIP) for new deployments are not affected and do not need to perform any action to mitigate the vulnerability.

Product Download
System Center Virtual Machine Manager 2022 https://go.microsoft.com/fwlink/p/?LinkID=2195845
System Center Virtual Machine Manager 2019 https://go.microsoft.com/fwlink/p/?LinkID=2195725
System Center Virtual Machine Manager 2025 https://go.microsoft.com/fwlink/?linkid=2292412
System Center Data Protection Manager 2025 https://go.microsoft.com/fwlink/?linkid=2292311
System Center Data Protection Manager 2022 https://go.microsoft.com/fwlink/p/?LinkID=2195847
System Center Data Protection Manager 2019 https://go.microsoft.com/fwlink/p/?LinkID=2195851
System Center Orchestrator 2019 https://go.microsoft.com/fwlink/p/?LinkID=2195848
System Center Orchestrator 2022 https://go.microsoft.com/fwlink/p/?LinkID=2195531
System Center Orchestrator 2025 https://go.microsoft.com/fwlink/?linkid=2292411
System Center Service Manager 2019 https://go.microsoft.com/fwlink/p/?LinkID=2195849
System Center Service Manager 2022 https://go.microsoft.com/fwlink/p/?LinkID=2195846
System Center Service Manager 2025 https://go.microsoft.com/fwlink/?linkid=2292310
System Center Operations Manager 2019 https://go.microsoft.com/fwlink/p/?LinkID=2195532
System Center Operations Manager 2022 https://go.microsoft.com/fwlink/p/?LinkID=2195530
System Center Operations Manager 2025 https://go.microsoft.com/fwlink/?linkid=2292308

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack vector is local (AV:L). What does this mean for this vulnerability?

To successfully exploit this vulnerability, an attacker must have access to the device to access the System Center Windows installer packages and then utilize DLL hijacking.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to have access to the location where the target file will be run. They would then need to plant a specific file that would be used as part of the exploitation.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27743
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
System Center Data Protection Manager 2019 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
System Center Data Protection Manager 2022 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
System Center Data Protection Manager 2025 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
System Center Operations Manager 2019 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
System Center Operations Manager 2022 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
System Center Operations Manager 2025 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
System Center Orchestrator 2019 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
System Center Orchestrator 2022 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
System Center Orchestrator 2025 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
System Center Service Manager 2019 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
System Center Service Manager 2022 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
System Center Service Manager 2025 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
System Center Virtual Machine Manager 2019 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
System Center Virtual Machine Manager 2022 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
System Center Virtual Machine Manager 2025 Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27743 Sandro Poppi


CVE-2025-27751 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27751
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Are the updates for the Microsoft Office LTSC for Mac currently available?

The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27751
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002704 (Security Update) Important Remote Code Execution 5002696
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002704 (Security Update) Important Remote Code Execution 5002696
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC for Mac 2024 Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Office Online Server 5002699 (Security Update) Important Remote Code Execution 5002690
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20003
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27751 f4(@dnpushme)


CVE-2025-27752 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27752
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Are the updates for the Microsoft Office LTSC for Mac currently available?

The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27752
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002700 (Security Update) Critical Remote Code Execution 5002693
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Office 2016 (64-bit edition) 5002700 (Security Update) Critical Remote Code Execution 5002693
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC for Mac 2024 Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27752 0x140ce


CVE-2025-27750 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27750
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Are the updates for the Microsoft Office LTSC for Mac currently available?

The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27750
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Excel 2016 (32-bit edition) 5002704 (Security Update) Important Remote Code Execution 5002696
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002704 (Security Update) Important Remote Code Execution 5002696
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC for Mac 2024 Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27750 f4(@dnpushme)


CVE-2025-29791 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-29791
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Are the updates for the Microsoft Office LTSC for Mac currently available?

The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-29791
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002700 (Security Update) Critical Remote Code Execution 5002693
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Office 2016 (64-bit edition) 5002700 (Security Update) Critical Remote Code Execution 5002693
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC for Mac 2024 Critical Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-29791 0x140ce


CVE-2025-29793 - Microsoft SharePoint Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-29793
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability?

The attack vector is Network (AV:N) because this vulnerability is remotely exploitable and can be exploited from the internet. The attack complexity is Low (AC:L) because an attacker does not require significant prior knowledge of the system and can achieve repeatable success with the payload against the vulnerable component.


According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

An authenticated attacker with Site Owner permissions can use the vulnerability to inject arbitrary code and execute this code in the context of SharePoint Server.


How could an attacker exploit the vulnerability?

In a network-based attack, an authenticated attacker, as at least a Site Owner, could write arbitrary code to inject and execute code remotely on the SharePoint Server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-29793
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002692 (Security Update) Important Remote Code Execution 5002685
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft SharePoint Server 2019 5002691 (Security Update) Important Remote Code Execution 5002678
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20003
Maybe None
Microsoft SharePoint Server Subscription Edition 5002705 (Security Update) Important Remote Code Execution 5002681
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.18526.20172
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-29793 zcgonvh


CVE-2025-29792 - Microsoft Office Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-29792
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally.


FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-29792
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002700 (Security Update) Important Elevation of Privilege 5002693
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Office 2016 (64-bit edition) 5002700 (Security Update) Important Elevation of Privilege 5002693
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-29792 邹瑞伦 with Codesafe Team of Legendsec at Qi'anxin Group


CVE-2025-29796 - Microsoft Edge for iOS Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-29796
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge for iOS Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.2
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

User interface (ui) misrepresentation of critical information in Microsoft Edge for iOS allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

A user could be tricked into entering credentials or responding to a pop up after opening a specially crafted file or clicking on a link, typically by way of an enticement in an email or URL.


What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
135.0.3179.54 4/3/2025 135.0.7049.41/.42/.52

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03-Apr-25    

Information published.


Low Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-29796
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge for iOS Release Notes (Security Update) Low Spoofing Base: 4.7
Temporal: 4.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:P/RL:O/RC:C
135.0.3179.54
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-29796 Barath Stalin K


CVE-2025-29794 - Microsoft SharePoint Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-29794
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper authorization in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability?

The attack vector is Network (AV:N) because this vulnerability is remotely exploitable and can be exploited from the internet. The attack complexity is Low (AC:L) because an attacker does not require significant prior knowledge of the system and can achieve repeatable success with the payload against the vulnerable component.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


How could an attacker exploit the vulnerability?

In a network-based attack, an authenticated attacker, as at least a Site Owner, could write arbitrary code to inject and execute code remotely on the SharePoint Server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-29794
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002692 (Security Update) Important Remote Code Execution 5002685
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft SharePoint Server 2019 5002691 (Security Update) Important Remote Code Execution 5002678
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20003
Maybe None
Microsoft SharePoint Server Subscription Edition 5002705 (Security Update) Important Remote Code Execution 5002681
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.18526.20172
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-29794 cjm00n with Cyber Kunlun & Zhiniang Peng


CVE-2025-29821 - Microsoft Dynamics Business Central Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-29821
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics Business Central Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Dynamics Business Central allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker that successfully exploited this vulnerability could recover cleartext passwords from memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-29821
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 Business Central 2023 Wave 2 – Update 23.18 5056716 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
23.18.32409
Maybe None
Microsoft Dynamics 365 Business Central 2024 Wave 2 – Update 25.6 5056718 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
25.6.32556
Maybe None
Microsoft Dynamics 365 Business Central 2025 Wave 1 – Update 26.0 Release Notes (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
26.0.32481
Maybe None
Microsoft Dynamics 365 Business Central Wave 1 2024 – Update 24.12 5056717 (Security Update) Important Information Disclosure Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
24.12.32447.0
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-29821 Nicklas Broberg Larsson with Navigot AB


CVE-2025-29820 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-29820
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Are the updates for the Microsoft Office LTSC for Mac currently available?

The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-29820
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2016 (32-bit edition) 5002702 (Security Update) Important Remote Code Execution 5002662
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Office 2016 (64-bit edition) 5002702 (Security Update) Important Remote Code Execution 5002662
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC for Mac 2024 Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft SharePoint Enterprise Server 2016 5002692 (Security Update)
5002682 (Security Update)
Important Remote Code Execution 5002685

5002671
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1002
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-29820 Haifei Li with EXPMON


CVE-2025-29822 - Microsoft OneNote Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-29822
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OneNote Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Incomplete list of disallowed inputs in Microsoft Office OneNote allows an unauthorized attacker to bypass a security feature locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft OneNote and then click on a specially crafted URL to be compromised by the attacker.


Are the updates for the Microsoft Office LTSC for Mac currently available?

The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-29822
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Security Feature Bypass Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Security Feature Bypass Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Security Feature Bypass Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Security Feature Bypass Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Security Feature Bypass Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Security Feature Bypass Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Security Feature Bypass Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Security Feature Bypass Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Important Security Feature Bypass None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC for Mac 2024 Important Security Feature Bypass None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft OneNote 2016 (32-bit edition) 5002622 (Security Update) Important Security Feature Bypass 4484434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1001
Maybe None
Microsoft OneNote 2016 (64-bit edition) 5002622 (Security Update) Important Security Feature Bypass 4484434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1001
Maybe None
Microsoft OneNote for Mac Release Notes (Security Update) Important Security Feature Bypass Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.96.25033028
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-29822 Daniel Weglowski


CVE-2025-29823 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-29823
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-29823
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-29823 f4(@dnpushme)


CVE-2025-29824 - Windows Common Log File System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-29824
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-29824
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-29824 Microsoft Threat Intelligence Center


CVE-2025-24074 - Microsoft DWM Core Library Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24074
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24074
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24074 YanZiShuang@BigCJTeam of cyberkl


CVE-2025-24073 - Microsoft DWM Core Library Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24073
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24073
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24073 YanZiShuang@BigCJTeam of cyberkl


Microsoft Offensive Research & Security Engineering (MORSE) with Microsoft


CVE-2025-21174 - Windows Standards-Based Storage Management Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21174
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21174
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2025 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21174 None

CVE-2025-21197 - Windows NTFS Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21197
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows NTFS Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Windows NTFS allows an authorized attacker to disclose file path information under a folder where the attacker doesn't have permission to list content.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability includes unauthorized access to the file system, specifically file path information.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:

The following mitigating factors might be helpful in your situation:

To mitigate against possible application compatibility risks, the fix to address this vulnerability has been released as disabled by default. However, administrators have been given the ability to enable this behavior if needed through a registry key. For specific instructions on how administrators can enable this behavior, please see the following article: https://support.microsoft.com/help/5058189


Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21197
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Information Disclosure
5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Information Disclosure 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Information Disclosure 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Information Disclosure 5053599
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21197 Sébastien Huneault with CyberQuébec


CVE-2025-21191 - Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21191
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Time-of-check time-of-use (toctou) race condition in Windows Local Security Authority (LSA) allows an authorized attacker to elevate privileges locally.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21191
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21191 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2025-21205 - Windows Telephony Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21205
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Telephony Service Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21205
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution
5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Remote Code Execution 5053599
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21205 Floriel (EPIN)


CVE-2025-21203 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21203
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21203
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Information Disclosure 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Information Disclosure 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Information Disclosure 5053599
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21203 Anonymous


CVE-2025-21204 - Windows Process Activation Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21204
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Process Activation Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


How could an attacker exploit this vulnerability?

An authenticated attacker who successfully exploits this vulnerability gains the ability to perform and/or manipulate file management operations on the victim machine in the context of the NT AUTHORITY\SYSTEM account.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21204
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21204 BochengXiang(@Crispr) with FDU


CVE-2025-21221 - Windows Telephony Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21221
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Telephony Service Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21221
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution
5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Remote Code Execution 5053599
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21221 Floriel (EPIN)


CVE-2025-21222 - Windows Telephony Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-21222
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Telephony Service Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-21222
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution
5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Remote Code Execution 5053599
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-21222 Floriel (EPIN)


CVE-2025-24058 - Windows DWM Core Library Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-24058
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Windows DWM Core Library allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-24058
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-24058 YanZiShuang@BigCJTeam of cyberkl


CVE-2025-25000 - Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25000
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Access of resource using incompatible type ('type confusion') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
135.0.3179.54 4/3/2025 135.0.7049.41/.42/.52

How could an attacker exploit this vulnerability via the Network?

An attacker could host a specially crafted website designed to exploit the vulnerability through Microsoft Edge and then convince a user to view the website. However, in all cases an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action, typically by an enticement in an email or instant message, or by getting the user to open an attachment sent through email.


Mitigations:
None
Workarounds:
None
Revision:
1.0    03-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25000
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
135.0.3179.54
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25000 Nan Wang(@eternalsakura13)


CVE-2025-25001 - Microsoft Edge for iOS Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25001
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge for iOS Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.


FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability?

An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability).


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This vulnerability requires that a user have multiple browser instances open of the affected version of Microsoft Edge (Chromium-based), one of which is a specially crafted website hosted by the attacker. The user would need to access the URL of the malicious website and then click a popup displayed on that site.


What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
132.0.2957.118 1/20/2025 132.0.6834.84

Mitigations:
None
Workarounds:
None
Revision:
1.0    03-Apr-25    

Information published.


Low Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25001
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge for iOS Release Notes (Security Update) Low Spoofing Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
132.0.2957.118
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25001 MUHAMMAD ZAID GHIFARI with KALIMANTAN UTARA


CVE-2025-25002 - Azure Local Cluster Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-25002
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Local Cluster Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Insertion of sensitive information into log file in Azure Local Cluster allows an authorized attacker to disclose information over an adjacent network.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is user tokens and other potentially sensitive information.


According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability?

This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-25002
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Local Cluster Release Notes (Security Update) Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2411.2
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-25002 Alex Stanescu with Microsoft


Derek Chu and Alex Stanescu with Microsoft


CVE-2025-26628 - Azure Local Cluster Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26628
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Local Cluster Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Insufficiently protected credentials in Azure Local Cluster allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is device information such as a token, credentials, resource ids, sas tokens, user properties, and other sensitive information.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to a high loss of confidentiality (C:H) and integrity (I:H), and some loss of availability (A:L). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could view sensitive information, such as a token and credential in this scenario (Confidentiality) and make changes to disclosed information (Integrity), and they might be able to force a crash within the service (Availability).


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26628
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Local Cluster Release Notes (Security Update) Important Information Disclosure Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C
2411.2
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26628 Vani Nadh Koyi with Microsoft


Vijay Chegu with Microsoft


Dan DeFolo with Microsoft


CVE-2025-26639 - Windows USB Print Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26639
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows USB Print Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Integer overflow or wraparound in Windows USB Print Driver allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26639
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26639 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-26635 - Windows Hello Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26635
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hello Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Weak authentication in Windows Hello allows an authorized attacker to bypass a security feature over a network.


FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass the Windows Hello security feature.

Where can I find more information about Windows Hello?

Please see Windows Hello | Microsoft Learn for more details.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26635
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Security Feature Bypass
5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows Server 2019 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Security Feature Bypass 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Security Feature Bypass 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Security Feature Bypass 5053599
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.1551
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26635 Eduardo Barrera with Microsoft


CVE-2025-26637 - BitLocker Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26637
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: BitLocker Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26637
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Security Feature Bypass None Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Security Feature Bypass None Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Security Feature Bypass 5053594
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Security Feature Bypass 5053594
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Security Feature Bypass
5053602
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Security Feature Bypass 5053598
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Security Feature Bypass 5053598
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Security Feature Bypass 5053887
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Security Feature Bypass 5053887
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Security Feature Bypass 5053594
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Security Feature Bypass 5053594
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Security Feature Bypass 5053603
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Security Feature Bypass 5053603
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Security Feature Bypass 5053599
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Security Feature Bypass 5053598
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Security Feature Bypass 5053598
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26637

Julian Lemmerich with cirosec GmbH


Lukas Dusold with cirosec GmbH


CVE-2025-26642 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26642
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally.


FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Are the updates for the Microsoft Office LTSC for Mac currently available?

The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26642
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Access 2016 (32-bit edition) 5002701 (Security Update) Important Remote Code Execution 5002697
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1000
Maybe None
Microsoft Access 2016 (64-bit edition) 5002701 (Security Update) Important Remote Code Execution 5002697
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1000
Maybe None
Microsoft Excel 2016 (32-bit edition) 5002704 (Security Update) Important Remote Code Execution 5002696
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1000
Maybe None
Microsoft Excel 2016 (64-bit edition) 5002704 (Security Update) Important Remote Code Execution 5002696
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1000
Maybe None
Microsoft Office 2016 (32-bit edition) 5002588 (Security Update)
5002703 (Security Update)
Important Remote Code Execution 5002115

5002694
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1000
Maybe None
Microsoft Office 2016 (64-bit edition) 5002588 (Security Update)
5002703 (Security Update)
Important Remote Code Execution 5002115

5002694
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5495.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases
No None
Microsoft Office LTSC for Mac 2021 Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft Office LTSC for Mac 2024 Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Microsoft SharePoint Server 2019 5002691 (Security Update) Important Remote Code Execution 5002678
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20003
Maybe None
Office Online Server 5002699 (Security Update) Important Remote Code Execution 5002690
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10417.20003
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26642 Anonymous


CVE-2025-26640 - Windows Digital Media Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26640
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Digital Media Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker with low integrity level privileges who successfully exploited this vulnerability could gain medium integrity level privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26640
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26640 Anonymous


CVE-2025-26641 - Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26641
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26641
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Denial of Service
5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Denial of Service 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Denial of Service 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Denial of Service 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Denial of Service 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Denial of Service 5053599
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26641 Azure Yang with Kunlun Lab


CVE-2025-26644 - Windows Hello Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26644
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hello Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.1/TemporalScore:4.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Automated recognition mechanism with inadequate detection or handling of adversarial input perturbations in Windows Hello allows an unauthorized attacker to perform spoofing locally.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26644
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Spoofing 5053596
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Spoofing 5053596
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Spoofing 5053606
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Spoofing 5053606
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Spoofing 5053606
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Spoofing
5053606
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Spoofing
5053606
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Spoofing
5053606
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Spoofing 5053602
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Spoofing 5053602
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Spoofing 5053602
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Spoofing
5053602
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Spoofing 5053598
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Spoofing 5053598
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2019 5055519 (Security Update) Important Spoofing 5053596
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Spoofing 5053596
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2025 5055523 (Security Update) Important Spoofing 5053598
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Spoofing 5053598
Base: 5.1
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26644 Hu Bowen with Nanyang Technological University


Wang Kuo with Nanyang Technological University


Chang Chip-Hong with Nanyang Technological University


CVE-2025-26648 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26648
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Sensitive data storage in improperly locked memory in Windows Kernel allows an authorized attacker to elevate privileges locally.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26648
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26648 Anonymous


CVE-2025-26649 - Windows Secure Channel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26649
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Secure Channel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain domain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26649
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26649 Anonymous


CVE-2025-26647 - Windows Kerberos Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26647
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kerberos Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network.


FAQ:

How could an attacker exploit this vulnerability?

An authenticated attacker could exploit this vulnerability by establishing a machine-in-the-middle (MITM) attack or other local network spoofing technique, then sending a malicious Kerberos message to the client victim machine to spoof itself as the Kerberos authentication server.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by compromising a publicly trusted Certificate Authority (CA), issuing a certificate with the desired Subject Key Identifier (SKI) value, and using that certificate to connect to the system, thereby assuming the identity of any account with a strong mapping using the SKI.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could be assigned much greater rights by the Key Distribution Center to the certificate than intended.


Mitigations:

To help protect your environment and prevent outages, we recommend the following steps:

  • UPDATE all Windows computers and domain controllers with a Windows update released on or after April 8, 2025.
  • MONITOR audit events that will be visible in Audit mode to identify all devices that are not updated.
  • ENABLE Enforcement mode once your environment is no longer using certificates issued by authorities that are not in the NTAuth store.

For more information, please review: https://support.microsoft.com/help/5057784.


Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26647
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26647 Oscar Virot with Toriv AB




CVE-2025-26651 - Windows Local Session Manager (LSM) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26651
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Local Session Manager (LSM) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposed dangerous method or function in Windows Local Session Manager (LSM) allows an authorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26651
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Denial of Service
5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Denial of Service 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Denial of Service 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2022 5055526 (Security Update) Important Denial of Service 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Denial of Service 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Denial of Service 5053599
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Denial of Service 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Denial of Service 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26651 Remco van der Meer


CVE-2025-26652 - Windows Standards-Based Storage Management Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26652
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26652
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2025 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26652 k0shl with Kunlun Lab


CVE-2025-26670 - Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26670
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An unauthenticated attacker could sequentially send specially crafted requests to a vulnerable LDAP server. Successful exploitation could result in a use after free which could be leveraged to achieve remote code execution.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26670
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Critical Remote Code Execution None Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Critical Remote Code Execution None Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Critical Remote Code Execution 5053606
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Critical Remote Code Execution 5053606
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Critical Remote Code Execution 5053606
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Critical Remote Code Execution
5053606
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Critical Remote Code Execution
5053606
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Critical Remote Code Execution
5053606
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Critical Remote Code Execution 5053602
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Critical Remote Code Execution 5053602
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Critical Remote Code Execution 5053602
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Critical Remote Code Execution
5053602
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Critical Remote Code Execution 5053888
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Critical Remote Code Execution 5053888
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Critical Remote Code Execution 5053888
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Critical Remote Code Execution 5053888
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Critical Remote Code Execution 5053620
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Critical Remote Code Execution 5053620
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Critical Remote Code Execution 5053886
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Critical Remote Code Execution 5053886
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Critical Remote Code Execution 5053887
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Critical Remote Code Execution 5053887
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Critical Remote Code Execution 5053603
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Critical Remote Code Execution 5053603
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Critical Remote Code Execution 5053599
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26670 Anonymous


CVE-2025-26671 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26671
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26671
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Remote Code Execution 5053599
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26671 ʌ!ɔ⊥ojv with Kunlun Lab


CVE-2025-26674 - Windows Media Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26674
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Media Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Media allows an authorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26674
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2019 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Remote Code Execution 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26674 Anonymous


CVE-2025-26672 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26672
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26672
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Information Disclosure
5053602
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Information Disclosure 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Information Disclosure 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Information Disclosure 5053599
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26672 Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group


CVE-2025-26673 - Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26673
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26673
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Denial of Service
5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Denial of Service 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Denial of Service 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Denial of Service 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Denial of Service 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Denial of Service 5053599
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26673 Azure Yang with Kunlun Lab


CVE-2025-26675 - Windows Subsystem for Linux Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26675
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Subsystem for Linux Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26675
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26675 Angelboy (@scwuaptx) with DEVCORE


CVE-2025-26676 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26676
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.


FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26676
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Information Disclosure 5053888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Information Disclosure 5053620
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Information Disclosure 5053886
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Information Disclosure 5053887
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Information Disclosure 5053594
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Information Disclosure 5053596
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Information Disclosure 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Information Disclosure 5053603
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Information Disclosure 5053599
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Information Disclosure 5053598
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26676 Anonymous


CVE-2025-26678 - Windows Defender Application Control Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26678
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Defender Application Control Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper access control in Windows Defender Application Control (WDAC) allows an unauthorized attacker to bypass a security feature locally.


FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploits this vulnerability could bypass Windows Defender Application Control (WDAC) enforcement. This could lead to the ability to run unauthorized applications on target systems.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by launching any executable that is allowed to launch by a per process rule. Once that executable is validly launched by the correct process, any restrictions on the executable are lifted; and it can be executed outside of the correct process. This bypasses the application control policy entirely


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26678
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Security Feature Bypass
5053602
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Security Feature Bypass 5053598
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Security Feature Bypass 5053598
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2019 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Security Feature Bypass 5053603
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Security Feature Bypass 5053603
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Security Feature Bypass 5053599
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Security Feature Bypass 5053598
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Security Feature Bypass 5053598
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26678 Deven Bowers with Microsoft


CVE-2025-26679 - RPC Endpoint Mapper Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-26679
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: RPC Endpoint Mapper Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in RPC Endpoint Mapper Service allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could execute code in the security context of the “NT AUTHORITY\Network Service” account.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-26679
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-26679 Zhang WangJunJie, He YiSheng with Hillstone Networks


CVE-2025-27467 - Windows Digital Media Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27467
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Digital Media Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited the vulnerability could elevate from a low integrity level up to a medium integrity level.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27467
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27467 Dongjun Kim (smlijun) with Ajou University & ENKI WhiteHat


CVE-2025-27469 - Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27469
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27469
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Denial of Service 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Denial of Service
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Denial of Service 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Denial of Service
5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Denial of Service 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Denial of Service 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Denial of Service 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Denial of Service 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Denial of Service 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Denial of Service 5053599
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27469 Azure Yang with Kunlun Lab


CVE-2025-27485 - Windows Standards-Based Storage Management Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27485
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27485
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2025 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27485 Azure Yang with Kunlun Lab


CVE-2025-27484 - Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27484
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Sensitive data storage in improperly locked memory in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27484
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27484 k0shl with Kunlun Lab


CVE-2025-27480 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27480
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.


FAQ:

How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27480
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5055581 (Monthly Rollup) Critical Remote Code Execution 5053886
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Critical Remote Code Execution 5053886
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Critical Remote Code Execution 5053887
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Critical Remote Code Execution 5053887
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Critical Remote Code Execution 5053603
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Critical Remote Code Execution 5053603
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Critical Remote Code Execution 5053599
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27480 ʌ!ɔ⊥ojv with Kunlun Lab


CVE-2025-27481 - Windows Telephony Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27481
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Telephony Service Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Stack-based buffer overflow in Windows Telephony Service allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27481
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution
5053602
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Remote Code Execution 5053888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Remote Code Execution 5053599
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27481 Anonymous


CVE-2025-27482 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27482
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27482
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Critical Remote Code Execution 5053603
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Critical Remote Code Execution 5053603
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Critical Remote Code Execution 5053599
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27482 ʌ!ɔ⊥ojv with Kunlun Lab


bee13oy with Cyber Kunlun Lab


CVE-2025-27483 - NTFS Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27483
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NTFS Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27483
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27483 Will Dormann with Vul Labs


CVE-2025-27487 - Remote Desktop Client Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27487
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Desktop Client Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of this vulnerability requires a user to remote into a server that is controlled by an attacker, which could then allow the server to execute a command on the user's machine without their consent. This scenario assumes that the user has the ability to remote into the server and that the server has been compromised to execute such commands upon connection.


How could an attacker exploit this vulnerability?

In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27487
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Remote Desktop client for Windows Desktop Release Notes (Security Update) Important Remote Code Execution Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.2.6081.0
Maybe None
Windows 10 for 32-bit Systems Important Remote Code Execution None Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Remote Code Execution None Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution
5053602
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows App Client for Windows Desktop Release Notes (Security Update) Important Remote Code Execution Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2.0.379.0
Maybe None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Remote Code Execution 5053620
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Remote Code Execution 5053886
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Remote Code Execution 5053887
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Remote Code Execution 5053594
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Remote Code Execution 5053596
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Remote Code Execution 5053603
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Remote Code Execution 5053599
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27487 Josh Watson with Microsoft


Nicholas Vadasz with Microsoft


Philemon Orphee Favrod with Microsoft


CVE-2025-27489 - Azure Local Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27489
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Local Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Azure Local allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges would an attacker gain by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could load a non-Microsoft DLL into an enclave, potentially leading to code execution within the context of the target enclave.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27489
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Stack HCI OS 22H2 5055526 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3328
Yes None
Azure Stack HCI OS 23H2 Release Notes (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1486
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27489 Microsoft Offensive Research & Security Engineering


CVE-2025-27486 - Windows Standards-Based Storage Management Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27486
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27486
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Denial of Service 5053887
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Denial of Service 5053594
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Denial of Service 5053596
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Denial of Service 5053603
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2025 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Denial of Service 5053598
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27486 Azure Yang with Kunlun Lab


CVE-2025-27492 - Windows Secure Channel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27492
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Secure Channel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Secure Channel allows an authorized attacker to elevate privileges locally.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain domain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27492
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27492 Anonymous


CVE-2025-27491 - Windows Hyper-V Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27491
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Hyper-V allows an authorized attacker to execute code over a network.


FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authorized attacker with guest privileges must send a victim a malicious site and convince them to open it.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27491
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Critical Remote Code Execution None Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Critical Remote Code Execution None Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Critical Remote Code Execution 5053606
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Critical Remote Code Execution 5053606
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Critical Remote Code Execution 5053606
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Critical Remote Code Execution
5053606
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Critical Remote Code Execution
5053606
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Critical Remote Code Execution
5053606
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Critical Remote Code Execution 5053602
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Critical Remote Code Execution 5053602
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Critical Remote Code Execution 5053602
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Critical Remote Code Execution
5053602
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2016 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Critical Remote Code Execution 5053594
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Critical Remote Code Execution 5053596
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Critical Remote Code Execution 5053603
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Critical Remote Code Execution 5053603
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Critical Remote Code Execution 5053599
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Critical Remote Code Execution 5053598
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27491 Chief Banana


CVE-2025-27490 - Windows Bluetooth Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27490
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Bluetooth Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Heap-based buffer overflow in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could create or delete files in the security context of the “NT AUTHORITY\ LOCAL SERVICE” account.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27490
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27490 Erik Peterson with Microsoft Corporation


Robert Zhao and Erik Peterson with Microsoft Corporation


CVE-2025-27727 - Windows Installer Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27727
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Installer Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to elevate privileges locally.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27727
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27727 Simon (@sim0nsecurity)


CVE-2025-27729 - Windows Shell Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27729
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Shell Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Shell allows an unauthorized attacker to execute code locally.


FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27729
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Remote Code Execution
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Remote Code Execution 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Remote Code Execution
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Remote Code Execution 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27729 Lewis Lee


CVE-2025-27728 - Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27728
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27728
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27728 Anonymous


CVE-2025-27731 - Microsoft OpenSSH for Windows Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27731
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OpenSSH for Windows Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in OpenSSH for Windows allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27731
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27731 Jordan Borean


CVE-2025-27730 - Windows Digital Media Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27730
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Digital Media Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Use after free in Windows Digital Media allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited the vulnerability could elevate from a low integrity level up to a medium integrity level.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27730
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27730 Dongjun Kim (smlijun) with Ajou University & ENKI WhiteHat


CVE-2025-27732 - Windows Graphics Component Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27732
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Graphics Component Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Sensitive data storage in improperly locked memory in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27732
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege 5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Elevation of Privilege
5053606
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Elevation of Privilege 5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Elevation of Privilege
5053602
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Elevation of Privilege 5053603
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Elevation of Privilege 5053599
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Elevation of Privilege 5053598
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27732 Anonymous


CVE-2025-27733 - NTFS Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27733
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NTFS Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.


FAQ:

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27733
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
Important Elevation of Privilege 5053888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055561 (Monthly Rollup)
5055570 (Security Only)
Important Elevation of Privilege 5053620
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27670
Yes None
Windows Server 2012 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055581 (Monthly Rollup) Important Elevation of Privilege 5053886
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25423
Yes None
Windows Server 2012 R2 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2012 R2 (Server Core installation) 5055557 (Monthly Rollup) Important Elevation of Privilege 5053887
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22523
Yes None
Windows Server 2016 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Elevation of Privilege 5053594
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Elevation of Privilege 5053596
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27733 Will Dormann with Vul Labs


CVE-2025-27735 - Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27735
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.0/TemporalScore:5.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Insufficient verification of data authenticity in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to bypass a security feature locally.


FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass the Virtualization-based Security feature.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27735
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Security Feature Bypass None Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Security Feature Bypass None Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Security Feature Bypass 5053594
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Security Feature Bypass 5053594
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Security Feature Bypass
5053602
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Security Feature Bypass 5053598
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Security Feature Bypass 5053598
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2016 5055521 (Security Update) Important Security Feature Bypass 5053594
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Security Feature Bypass 5053594
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Security Feature Bypass 5053603
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Security Feature Bypass 5053603
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Security Feature Bypass 5053599
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Security Feature Bypass 5053598
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Security Feature Bypass 5053598
Base: 6.0
Temporal: 5.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27735 None

CVE-2025-27736 - Windows Power Dependency Coordinator Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27736
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Power Dependency Coordinator Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Exposure of sensitive information to an unauthorized actor in Windows Power Dependency Coordinator allows an authorized attacker to disclose information locally.


FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27736
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Information Disclosure 5053594
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Information Disclosure 5053594
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Information Disclosure 5053596
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Information Disclosure 5053596
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Information Disclosure 5053606
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Information Disclosure
5053606
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Information Disclosure 5053602
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Information Disclosure
5053602
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Information Disclosure 5053598
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Information Disclosure 5053598
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2016 5055521 (Security Update) Important Information Disclosure 5053594
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2016 (Server Core installation) 5055521 (Security Update) Important Information Disclosure 5053594
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows Server 2019 5055519 (Security Update) Important Information Disclosure 5053596
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2019 (Server Core installation) 5055519 (Security Update) Important Information Disclosure 5053596
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows Server 2022 5055526 (Security Update) Important Information Disclosure 5053603
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022 (Server Core installation) 5055526 (Security Update) Important Information Disclosure 5053603
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.3454
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5055527 (Security Update) Important Information Disclosure 5053599
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1551
Yes None
Windows Server 2025 5055523 (Security Update) Important Information Disclosure 5053598
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2025 (Server Core installation) 5055523 (Security Update) Important Information Disclosure 5053598
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.3775
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2025-27736 Microsoft Offensive Research & Security Engineering


CVE-2025-27737 - Windows Security Zone Mapping Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2025-27737
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Security Zone Mapping Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.6/TemporalScore:7.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

Improper input validation in Windows Security Zone Mapping allows an unauthorized attacker to bypass a security feature locally.


FAQ:

According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.


The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2?

While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms.

To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability.


Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

The security update for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

A URL path could be constructed by an attacker in such a way that the URL’s Zone is interpreted as belonging to a more privileged zone


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-25    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2025-27737
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems Important Security Feature Bypass None Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 for x64-based Systems Important Security Feature Bypass None Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Unknown Unknown None
Windows 10 Version 1607 for 32-bit Systems 5055521 (Security Update) Important Security Feature Bypass 5053594
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1607 for x64-based Systems 5055521 (Security Update) Important Security Feature Bypass 5053594
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7970
Yes None
Windows 10 Version 1809 for 32-bit Systems 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 1809 for x64-based Systems 5055519 (Security Update) Important Security Feature Bypass 5053596
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.7137
Yes None
Windows 10 Version 21H2 for 32-bit Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 21H2 for x64-based Systems 5055518 (Security Update) Important Security Feature Bypass 5053606
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5737
Yes None
Windows 10 Version 22H2 for 32-bit Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 10 Version 22H2 for x64-based Systems 5055518 (Security Update) Important Security Feature Bypass
5053606
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.5737
Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 22H2 for x64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5055528 (Security Update) Important Security Feature Bypass 5053602
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.5191
Yes None
Windows 11 Version 23H2 for x64-based Systems 5055528 (Security Update) Important Security Feature Bypass
5053602
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.5191
Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5055523 (Security Update) Important Security Feature Bypass 5053598
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows 11 Version 24H2 for x64-based Systems 5055523 (Security Update) Important Security Feature Bypass 5053598
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.3775
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
5055515 (IE Cumulative)
Important Security Feature Bypass 5053888
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220

1.000
Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
5055515 (IE Cumulative)
Important Security Feature Bypass 5053888
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220

1.000
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5055609 (Monthly Rollup)
5055596 (Security Only)
5055515 (IE Cumulative)
Important Security Feature Bypass 5053888
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220

1.000
Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5055609 (Monthly Rollup)
5055596 (Security Only)
5055515 (IE Cumulative)
Important Security Feature Bypass 5053888
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23220

1.000
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5055515 (IE Cumulative)
5055561 (Monthly Rollup)
5055570 (Security Only)
Important Security Feature Bypass
5053620
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
1.000

6.1.7601.27670
Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5055515 (IE Cumulative)
5055561 (Monthly Rollup)
5055570 (Security Only)
Important Security Feature Bypass
5053620
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
1.000

6.1.7601.27670
Yes None
Windows Server 2012 5055515 (IE Cumulative)
5055581 (Monthly Rollup)
Important Security Feature Bypass
5053886
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
1.000

6.2.9200.25423
Yes None
Windows Server 2012 (Server Core installation) 5055515 (IE Cumulative)
5055581 (Monthly Rollup)
Important Security Feature Bypass
5053886
Base: 8.6
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
1.000

6.2.9200.25423
Yes None
Windows Server 2012 R2 5055515 (IE Cumulative)
5055557 (Monthly Rollup)
Important Security Feature Bypas