This report contains detail for the following vulnerabilities:
CVE Issued by | Tag | CVE ID | CVE Title |
---|---|---|---|
Microsoft | Azure - Networking | CVE-2025-54914 | Azure Networking Elevation of Privilege Vulnerability |
Microsoft | Azure Arc | CVE-2025-55316 | Azure Arc Elevation of Privilege Vulnerability |
Microsoft | Azure Bot Service | CVE-2025-55244 | Azure Bot Service Elevation of Privilege Vulnerability |
Microsoft | Azure Entra | CVE-2025-55241 | Azure Entra Elevation of Privilege Vulnerability |
Microsoft | Azure Windows Virtual Machine Agent | CVE-2025-49692 | Azure Connected Machine Agent Elevation of Privilege Vulnerability |
Microsoft | Capability Access Management Service (camsvc) | CVE-2025-54108 | Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability |
Microsoft | Dynamics 365 FastTrack Implementation Assets | CVE-2025-55238 | Dynamics 365 FastTrack Implementation Assets Information Disclosure Vulnerability |
Microsoft | Graphics Kernel | CVE-2025-55236 | Graphics Kernel Remote Code Execution Vulnerability |
Microsoft | Graphics Kernel | CVE-2025-55223 | DirectX Graphics Kernel Elevation of Privilege Vulnerability |
Microsoft | Graphics Kernel | CVE-2025-55226 | Graphics Kernel Remote Code Execution Vulnerability |
Linux | Mariner | CVE-2025-38705 | drm/amd/pm: fix null pointer access |
Linux | Mariner | CVE-2025-38679 | media: venus: Fix OOB read due to missing payload bound check |
Linux | Mariner | CVE-2025-38699 | scsi: bfa: Double-free fix |
Linux | Mariner | CVE-2025-38724 | nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() |
Linux | Mariner | CVE-2025-38687 | comedi: fix race between polling and detaching |
Linux | Mariner | CVE-2025-38702 | fbdev: fix potential buffer overflow in do_register_framebuffer() |
Linux | Mariner | CVE-2025-38725 | net: usb: asix_devices: add phy_mask for ax88772 mdio bus |
Linux | Mariner | CVE-2025-38717 | net: kcm: Fix race condition in kcm_unattach() |
Linux | Mariner | CVE-2025-38704 | rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer access |
Linux | Mariner | CVE-2025-38701 | ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr |
Linux | Mariner | CVE-2025-38706 | ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() |
Linux | Mariner | CVE-2025-38692 | exfat: add cluster chain loop check for dir |
Linux | Mariner | CVE-2025-38721 | netfilter: ctnetlink: fix refcount leak on table dump |
Linux | Mariner | CVE-2025-38712 | hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file() |
Linux | Mariner | CVE-2025-38711 | smb/server: avoid deadlock when linking with ReplaceIfExists |
Linux | Mariner | CVE-2025-38722 | habanalabs: fix UAF in export_dmabuf() |
Linux | Mariner | CVE-2025-38703 | drm/xe: Make dma-fences compliant with the safe access rules |
Linux | Mariner | CVE-2025-38696 | MIPS: Don't crash in stack_top() for tasks without ABI or vDSO |
Linux | Mariner | CVE-2025-38685 | fbdev: Fix vmalloc out-of-bounds write in fast_imageblit |
Linux | Mariner | CVE-2025-38691 | pNFS: Fix uninited ptr deref in block/scsi layout |
Linux | Mariner | CVE-2025-38680 | media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() |
Linux | Mariner | CVE-2025-38729 | ALSA: usb-audio: Validate UAC3 power domain descriptors, too |
Linux | Mariner | CVE-2025-38723 | LoongArch: BPF: Fix jump offset calculation in tailcall |
Linux | Mariner | CVE-2025-39730 | NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() |
Linux | Mariner | CVE-2025-39732 | wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask() |
redhat | Mariner | CVE-2025-7039 | Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file() |
Linux | Mariner | CVE-2025-38718 | sctp: linearize cloned gso packets in sctp_rcv |
Linux | Mariner | CVE-2025-38688 | iommufd: Prevent ALIGN() overflow |
Linux | Mariner | CVE-2025-38710 | gfs2: Validate i_depth for exhash directories |
Linux | Mariner | CVE-2025-38714 | hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() |
Linux | Mariner | CVE-2025-38730 | io_uring/net: commit partial buffers on retry |
Linux | Mariner | CVE-2025-38697 | jfs: upper bound check of tree index in dbAllocAG |
Linux | Mariner | CVE-2025-38716 | hfs: fix general protection fault in hfs_find_init() |
Linux | Mariner | CVE-2025-38684 | net/sched: ets: use old 'nbands' while purging unused classes |
Linux | Mariner | CVE-2025-38715 | hfs: fix slab-out-of-bounds in hfs_bnode_read() |
Linux | Mariner | CVE-2025-38681 | mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() |
Linux | Mariner | CVE-2025-38709 | loop: Avoid updating block size under exclusive owner |
Linux | Mariner | CVE-2025-38695 | scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure |
Linux | Mariner | CVE-2025-38708 | drbd: add missing kref_get in handle_write_conflicts |
Linux | Mariner | CVE-2025-38698 | jfs: Regular file corruption check |
Linux | Mariner | CVE-2025-38713 | hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() |
Linux | Mariner | CVE-2025-39673 | ppp: fix race conditions in ppp_fill_forward_path |
Linux | Mariner | CVE-2025-39715 | parisc: Revise gateway LWS calls to probe user read access |
Linux | Mariner | CVE-2025-39675 | drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session() |
Linux | Mariner | CVE-2025-38732 | netfilter: nf_reject: don't leak dst refcount for loopback packets |
Linux | Mariner | CVE-2025-39716 | parisc: Revise __get_user() to probe user read access |
Linux | Mariner | CVE-2025-39682 | tls: fix handling of zero-length records on the rx_list |
Linux | Mariner | CVE-2025-39706 | drm/amdkfd: Destroy KFD debugfs after destroy KFD wq |
Linux | Mariner | CVE-2025-39677 | net/sched: Fix backlog accounting in qdisc_dequeue_internal |
Linux | Mariner | CVE-2025-39707 | drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities |
Linux | Mariner | CVE-2025-39701 | ACPI: pfr_update: Fix the driver update version check |
Linux | Mariner | CVE-2025-38734 | net/smc: fix UAF on smcsk after smc_listen_out() |
Linux | Mariner | CVE-2025-38736 | net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization |
Linux | Mariner | CVE-2025-39683 | tracing: Limit access to parser->buffer when trace_get_user failed |
Linux | Mariner | CVE-2025-39681 | x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper |
redhat | Mariner | CVE-2025-9566 | Podman: podman kube play command may overwrite host files |
mitre | Mariner | CVE-2025-57052 | cJSON 1.5.0 through 1.7.18 allows out-of-bounds access via the decode_array_index_from_pointer function in cJSON_Utils.c, allowing remote attackers to bypass array bounds checking and access restricted data via malformed JSON pointer strings containing alphanumeric characters. |
Linux | Mariner | CVE-2025-39676 | scsi: qla4xxx: Prevent a potential error pointer dereference |
Linux | Mariner | CVE-2025-39719 | iio: imu: bno055: fix OOB access of hw_xlate array |
Linux | Mariner | CVE-2025-39691 | fs/buffer: fix use-after-free when call bh_read() helper |
Linux | Mariner | CVE-2025-39714 | media: usbtv: Lock resolution while streaming |
Linux | Mariner | CVE-2025-39679 | drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor(). |
Linux | Mariner | CVE-2025-39713 | media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() |
Linux | Mariner | CVE-2025-39702 | ipv6: sr: Fix MAC comparison to be constant-time |
Linux | Mariner | CVE-2025-39686 | comedi: Make insn_rw_emulate_bits() do insn->n samples |
Linux | Mariner | CVE-2025-39710 | media: venus: Add a check for packet size after reading from shared memory |
Linux | Mariner | CVE-2025-38735 | gve: prevent ethtool ops after shutdown |
Linux | Mariner | CVE-2025-39718 | vsock/virtio: Validate length in packet header before skb_put() |
Linux | Mariner | CVE-2025-39685 | comedi: pcl726: Prevent invalid irq number |
Linux | Mariner | CVE-2025-39703 | net, hsr: reject HSR frame if skb can't hold tag |
Linux | Mariner | CVE-2025-38700 | scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated |
Linux | Mariner | CVE-2025-39697 | NFS: Fix a race when updating an existing write |
Linux | Mariner | CVE-2025-39726 | s390/ism: fix concurrency management in ism_cmd() |
Linux | Mariner | CVE-2025-39709 | media: venus: protect against spurious interrupts during probe |
Linux | Mariner | CVE-2025-39687 | iio: light: as73211: Ensure buffer holes are zeroed |
Linux | Mariner | CVE-2025-39721 | crypto: qat - flush misc workqueue during device shutdown |
Linux | Mariner | CVE-2025-39694 | s390/sclp: Fix SCCB present check |
Linux | Mariner | CVE-2025-39705 | drm/amd/display: fix a Null pointer dereference vulnerability |
Linux | Mariner | CVE-2025-39693 | drm/amd/display: Avoid a NULL pointer dereference |
Linux | Mariner | CVE-2025-39711 | media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls |
Linux | Mariner | CVE-2025-39692 | smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy() |
Linux | Mariner | CVE-2025-39684 | comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() |
Linux | Mariner | CVE-2025-39724 | serial: 8250: fix panic due to PSLVERR |
Linux | Mariner | CVE-2025-39720 | ksmbd: fix refcount leak causing resource not released |
Linux | Mariner | CVE-2025-39689 | ftrace: Also allocate and copy hash for reading of filter files |
Linux | Mariner | CVE-2025-38678 | netfilter: nf_tables: reject duplicate device on updates |
redhat | Mariner | CVE-2025-9901 | Libsoup: improper handling of http vary header in libsoup caching |
Linux | Mariner | CVE-2025-38707 | fs/ntfs3: Add sanity check for file name |
Linux | Mariner | CVE-2025-39731 | f2fs: vm_unmap_ram() may be called from an invalid context |
Linux | Mariner | CVE-2025-38728 | smb3: fix for slab out of bounds on mount to ksmbd |
Microsoft | Microsoft AutoUpdate (MAU) | CVE-2025-55317 | Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability |
Microsoft | Microsoft Brokering File System | CVE-2025-54105 | Microsoft Brokering File System Elevation of Privilege Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-9866 | Chromium: CVE-2025-9866 Inappropriate implementation in Extensions |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-9867 | Chromium: CVE-2025-9867 Inappropriate implementation in Downloads |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2025-53791 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-9864 | Chromium: CVE-2025-9864 Use after free in V8 |
Chrome | Microsoft Edge (Chromium-based) | CVE-2025-9865 | Chromium: CVE-2025-9865 Inappropriate implementation in Toolbar |
Microsoft | Microsoft Graphics Component | CVE-2025-53807 | Windows Graphics Component Elevation of Privilege Vulnerability |
Microsoft | Microsoft Graphics Component | CVE-2025-53800 | Windows Graphics Component Elevation of Privilege Vulnerability |
Microsoft | Microsoft High Performance Compute Pack (HPC) | CVE-2025-55232 | Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2025-54910 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2025-55243 | Microsoft OfficePlus Spoofing Vulnerability |
Microsoft | Microsoft Office | CVE-2025-54906 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-54902 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-54899 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-54904 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-54903 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-54898 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-54896 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-54900 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2025-54901 | Microsoft Excel Information Disclosure Vulnerability |
Microsoft | Microsoft Office PowerPoint | CVE-2025-54908 | Microsoft PowerPoint Remote Code Execution Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2025-54897 | Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Visio | CVE-2025-54907 | Microsoft Office Visio Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Word | CVE-2025-54905 | Microsoft Word Information Disclosure Vulnerability |
Microsoft | Microsoft Virtual Hard Drive | CVE-2025-54112 | Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability |
Microsoft | Role: Windows Hyper-V | CVE-2025-54092 | Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft | Role: Windows Hyper-V | CVE-2025-54091 | Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft | Role: Windows Hyper-V | CVE-2025-54115 | Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft | Role: Windows Hyper-V | CVE-2025-54098 | Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft | SQL Server | CVE-2025-47997 | Microsoft SQL Server Information Disclosure Vulnerability |
Microsoft | SQL Server | CVE-2025-55227 | Microsoft SQL Server Elevation of Privilege Vulnerability |
VulnCheck | SQL Server | CVE-2024-21907 | VulnCheck: CVE-2024-21907 Improper Handling of Exceptional Conditions in Newtonsoft.Json |
Microsoft | Windows Ancillary Function Driver for WinSock | CVE-2025-54099 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
Microsoft | Windows BitLocker | CVE-2025-54911 | Windows BitLocker Elevation of Privilege Vulnerability |
Microsoft | Windows BitLocker | CVE-2025-54912 | Windows BitLocker Elevation of Privilege Vulnerability |
Microsoft | Windows Bluetooth Service | CVE-2025-53802 | Windows Bluetooth Service Elevation of Privilege Vulnerability |
Microsoft | Windows Connected Devices Platform Service | CVE-2025-54102 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability |
Microsoft | Windows Connected Devices Platform Service | CVE-2025-54114 | Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability |
Microsoft | Windows Defender Firewall Service | CVE-2025-53810 | Windows Defender Firewall Service Elevation of Privilege Vulnerability |
Microsoft | Windows Defender Firewall Service | CVE-2025-53808 | Windows Defender Firewall Service Elevation of Privilege Vulnerability |
Microsoft | Windows Defender Firewall Service | CVE-2025-54094 | Windows Defender Firewall Service Elevation of Privilege Vulnerability |
Microsoft | Windows Defender Firewall Service | CVE-2025-54915 | Windows Defender Firewall Service Elevation of Privilege Vulnerability |
Microsoft | Windows Defender Firewall Service | CVE-2025-54109 | Windows Defender Firewall Service Elevation of Privilege Vulnerability |
Microsoft | Windows Defender Firewall Service | CVE-2025-54104 | Windows Defender Firewall Service Elevation of Privilege Vulnerability |
Microsoft | Windows DWM | CVE-2025-53801 | Microsoft DWM Core Library Elevation of Privilege Vulnerability |
Microsoft | Windows Imaging Component | CVE-2025-53799 | Windows Imaging Component Information Disclosure Vulnerability |
Microsoft | Windows Internet Information Services | CVE-2025-53805 | HTTP.sys Denial of Service Vulnerability |
Microsoft | Windows Kernel | CVE-2025-53803 | Windows Kernel Memory Information Disclosure Vulnerability |
Microsoft | Windows Kernel | CVE-2025-53804 | Windows Kernel-Mode Driver Information Disclosure Vulnerability |
Microsoft | Windows Kernel | CVE-2025-54110 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Local Security Authority Subsystem Service (LSASS) | CVE-2025-54894 | Local Security Authority Subsystem Service Elevation of Privilege Vulnerability |
Microsoft | Windows Local Security Authority Subsystem Service (LSASS) | CVE-2025-53809 | Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability |
Microsoft | Windows Management Services | CVE-2025-54103 | Windows Management Service Elevation of Privilege Vulnerability |
Microsoft | Windows MapUrlToZone | CVE-2025-54107 | MapUrlToZone Security Feature Bypass Vulnerability |
Microsoft | Windows MapUrlToZone | CVE-2025-54917 | MapUrlToZone Security Feature Bypass Vulnerability |
Microsoft | Windows MultiPoint Services | CVE-2025-54116 | Windows MultiPoint Services Elevation of Privilege Vulnerability |
Microsoft | Windows NTFS | CVE-2025-54916 | Windows NTFS Remote Code Execution Vulnerability |
Microsoft | Windows NTLM | CVE-2025-54918 | Windows NTLM Elevation of Privilege Vulnerability |
Microsoft | Windows PowerShell | CVE-2025-49734 | PowerShell Direct Elevation of Privilege Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-54095 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-54096 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-53797 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-53796 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-54106 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-54097 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-53798 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-54113 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-55225 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2025-53806 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows SMB | CVE-2025-55234 | Windows SMB Elevation of Privilege Vulnerability |
Microsoft | Windows SMBv3 Client | CVE-2025-54101 | Windows SMB Client Remote Code Execution Vulnerability |
Microsoft | Windows SPNEGO Extended Negotiation | CVE-2025-54895 | SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Elevation of Privilege Vulnerability |
Microsoft | Windows TCP/IP | CVE-2025-54093 | Windows TCP/IP Driver Elevation of Privilege Vulnerability |
Microsoft | Windows UI XAML Maps MapControlSettings | CVE-2025-54913 | Windows UI XAML Maps MapControlSettings Elevation of Privilege Vulnerability |
Microsoft | Windows UI XAML Phone DatePickerFlyout | CVE-2025-54111 | Windows UI XAML Phone DatePickerFlyout Elevation of Privilege Vulnerability |
Microsoft | Windows Win32K - GRFX | CVE-2025-55224 | Windows Hyper-V Remote Code Execution Vulnerability |
Microsoft | Windows Win32K - GRFX | CVE-2025-55228 | Windows Graphics Component Remote Code Execution Vulnerability |
Microsoft | Windows Win32K - GRFX | CVE-2025-54919 | Windows Graphics Component Remote Code Execution Vulnerability |
Microsoft | Xbox | CVE-2025-55242 | Xbox Certification Bug Copilot Djando Information Disclosure Vulnerability |
Microsoft | XBox Gaming Services | CVE-2025-55245 | Xbox Gaming Services Elevation of Privilege Vulnerability |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2025-49734
MITRE NVD Issuing CNA: Microsoft |
CVE Title: PowerShell Direct Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Improper restriction of communication channel to intended endpoints in Windows PowerShell allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker, initially a non-admin user on the host, could hijack the PowerShell Direct session intended for communication between the admin user on host and a guest VM. This unauthorized access enables the attacker to impersonate the admin host user in communications with the guest, potentially manipulating or controlling guest-side operations. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Why am I getting login failure events on my unpatched guest VM? To ensure compatibility with unpatched guests, the new client attempts a login. This will produce an event in the Security Event log with event id 4625. The username will be This event should stop when you patch your guest. Note: The ?‹PSDirectVMLegacy> and 䕖卒佉N text is verbatim - this is what the user sees. Where can I find information about additional mitigation steps? There are edge case affecting hotpatched devices that have installed the September 2025 updates . These devices may experience failures with PowerShell Direct (PSDirect) connections when the host and guest virtual machines (VMs) are both not fully updated. If your hotpatched device is experiencing issues with PSDirect connection, we recommend updating both the host and guest VM with these updates. Additional information can be found in the Knowledge Base articles below.
Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49734 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-49734 | QWangWang |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53797
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53797 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Information Disclosure | 5063899 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53797 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53798
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53798 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Information Disclosure | 5063899 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53798 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54095
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54095 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Information Disclosure | 5063899 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54095 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54096
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54096 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Information Disclosure | 5063899 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54096 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54097
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54097 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Information Disclosure | 5063899 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54097 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54099
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Stack-based buffer overflow in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54099 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54099 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54101
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows SMB Client Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.8/TemporalScore:4.2
Executive Summary: Use after free in Windows SMBv3 Client allows an authorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are low (PR:L). What does that mean for this vulnerability? Exploitation of this vulnerability requires an authorized attacker on the domain to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54101 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Remote Code Execution | 5063889 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Remote Code Execution | 5063889 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Remote Code Execution | 5063871 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Remote Code Execution | 5063871 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Remote Code Execution | 5063875 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Remote Code Execution | 5063875 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Remote Code Execution | 5063875 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Remote Code Execution | 5063875 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Remote Code Execution | 5063906 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Remote Code Execution | 5063906 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Remote Code Execution | 5063950 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Remote Code Execution | 5063950 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Remote Code Execution | 5063871 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Remote Code Execution | 5063871 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063880 5063812 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063880 5063812 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Remote Code Execution | 5063899 |
Base: 4.8 Temporal: 4.2 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54101 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54102
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54102 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54102 | Zhang WangJunJie, He YiSheng with Hillstone Network Security Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54106
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54106 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Remote Code Execution | 5063950 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Remote Code Execution | 5063950 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Remote Code Execution | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Remote Code Execution | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063880 5063812 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063880 5063812 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Remote Code Execution | 5063899 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54106 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54110
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Integer overflow or wraparound in Windows Kernel allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to a contained execution environment escape. Please refer to AppContainer Isolation for more information. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by sending specially crafted input from a sandboxed user-mode process to trigger an integer overflow, resulting in a buffer overflow in the kernel and enabling privilege escalation or sandbox escape. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54110 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54110 | goodbyeselene |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54111
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows UI XAML Phone DatePickerFlyout Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows UI XAML Phone DatePickerFlyout allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-free vulnerability, even as a standard user. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to a contained execution environment escape. Please refer to AppContainer Isolation for more information. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54111 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54111 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54894
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Local Security Authority Subsystem Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54894 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54894 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54895
MITRE NVD Issuing CNA: Microsoft |
CVE Title: SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Integer overflow or wraparound in Windows SPNEGO Extended Negotiation allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to a contained execution environment escape. Please refer to AppContainer Isolation for more information. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54895 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54895 | Erik Egsgard with Field Effect |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54896
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. How could an attacker exploit the vulnerability? An attacker who successfully exploits this vulnerability could achieve remote code execution without user interaction. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user needs to be tricked into running malicious files. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54896 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002782 (Security Update) | Important | Remote Code Execution | 5002758 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002782 (Security Update) | Important | Remote Code Execution | 5002758 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Office Online Server | 5002776 (Security Update) | Important | Remote Code Execution | 5002752 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20047 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-54896 | wh1tc with Kunlun Lab & Zhiniang Peng with HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54897
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network. FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. I am running SharePoint Server 2016. Do the updates for SharePoint Enterprise Server 2016 also apply to the version I am running? Yes. The same KB number applies to both SharePoint Server 2016 and SharePoint Enterprise Server 2016. Customers running either version should install the security update to be protected from this vulnerability. According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability? The attack vector is Network (AV:N) because this vulnerability is remotely exploitable and can be exploited from the internet. The attack complexity is Low (AC:L) because an attacker does not require significant prior knowledge of the system and can achieve repeatable success with the payload against the vulnerable component. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54897 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Enterprise Server 2016 | 5002778 (Security Update) | Important | Remote Code Execution | 5002771 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002775 (Security Update) | Important | Remote Code Execution | 5002769 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20047 |
Maybe | None |
Microsoft SharePoint Server Subscription Edition | 5002784 (Security Update) | Important | Remote Code Execution | 5002773 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.19127.20100 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-54897 | zcgonvh's cat Vanilla |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54898
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user needs to be tricked into running malicious files. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54898 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002782 (Security Update) | Important | Remote Code Execution | 5002758 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002782 (Security Update) | Important | Remote Code Execution | 5002758 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Office Online Server | 5002776 (Security Update) | Important | Remote Code Execution | 5002752 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20047 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-54898 | wh1tc in Kunlun lab & devoke & Zhiniang Peng with HUST cdbb6164ddfda2b210fd348442322115 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54899
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Free of memory not on the heap in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54899 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002782 (Security Update) | Important | Remote Code Execution | 5002758 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002782 (Security Update) | Important | Remote Code Execution | 5002758 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-54899 | HAO LI with Venustech |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54902
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54902 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002782 (Security Update) | Important | Remote Code Execution | 5002758 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002782 (Security Update) | Important | Remote Code Execution | 5002758 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Office Online Server | 5002776 (Security Update) | Important | Remote Code Execution | 5002752 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20047 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-54902 | Quan Jin with DBAPPSecurity |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54903
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54903 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002782 (Security Update) | Important | Remote Code Execution | 5002758 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002782 (Security Update) | Important | Remote Code Execution | 5002758 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Office Online Server | 5002776 (Security Update) | Important | Remote Code Execution | 5002752 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20047 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-54903 | Quan Jin with DBAPPSecurity |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54904
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54904 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002782 (Security Update) | Important | Remote Code Execution | 5002758 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002782 (Security Update) | Important | Remote Code Execution | 5002758 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Office Online Server | 5002776 (Security Update) | Important | Remote Code Execution | 5002752 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20047 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-54904 | Quan Jin with DBAPPSecurity |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54905
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Word Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: Untrusted pointer dereference in Microsoft Office Word allows an unauthorized attacker to disclose information locally. FAQ: Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54905 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Information Disclosure | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Information Disclosure | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft SharePoint Enterprise Server 2016 | 5002778 (Security Update) 5002777 (Security Update) |
Important | Information Disclosure | 5002771 5002772 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002775 (Security Update) 5002774 (Security Update) |
Important | Information Disclosure | 5002769 5002770 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.10417.20047 |
Maybe | None |
Microsoft Word 2016 (32-bit edition) | 5002780 (Security Update) | Important | Information Disclosure | 5002763 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Word 2016 (64-bit edition) | 5002780 (Security Update) | Important | Information Disclosure | 5002763 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-54905 | Quan Jin with DBAPPSecurity |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54906
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Free of memory not on the heap in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54906 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002781 (Security Update) 5002576 (Security Update) 5002766 (Security Update) |
Important | Remote Code Execution | 5002756 5002469 5002635 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002781 (Security Update) 5002576 (Security Update) 5002766 (Security Update) |
Important | Remote Code Execution | 5002756 5002469 5002635 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft SharePoint Enterprise Server 2016 | 5002778 (Security Update) | Important | Remote Code Execution | 5002771 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft SharePoint Server 2019 | 5002775 (Security Update) | Important | Remote Code Execution | 5002769 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20047 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-54906 | wh1tc in Kunlun lab & devoke & Zhiniang Peng with HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54907
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Microsoft Office Visio allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54907 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None |
CVE ID | Acknowledgements |
CVE-2025-54907 | Li Shuang, willJ and Guang Gong with Vulnerability Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54908
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft PowerPoint Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54908 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft PowerPoint 2016 (32-bit edition) | 5002779 (Security Update) | Important | Remote Code Execution | 5002765 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft PowerPoint 2016 (64-bit edition) | 5002779 (Security Update) | Important | Remote Code Execution | 5002765 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-54908 | anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54913
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows UI XAML Maps MapControlSettings Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows UI XAML Maps MapControlSettings allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to a contained execution environment escape. Please refer to AppContainer Isolation for more information. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54913 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54913 | Zhiniang Peng with HUST & R4nger with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54916
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows NTFS Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Stack-based buffer overflow in Windows NTFS allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54916 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Remote Code Execution | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Remote Code Execution | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Remote Code Execution | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Remote Code Execution | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Remote Code Execution | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Remote Code Execution | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Remote Code Execution | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Remote Code Execution | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Remote Code Execution | 5063888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Remote Code Execution | 5063888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Remote Code Execution | 5063888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Remote Code Execution | 5063888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Remote Code Execution | 5063947 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Remote Code Execution | 5063947 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Remote Code Execution | 5063906 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Remote Code Execution | 5063906 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Remote Code Execution | 5063950 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Remote Code Execution | 5063950 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Remote Code Execution | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Remote Code Execution | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Remote Code Execution | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54916 | Sergey Tarasov with Positive Technologies |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54918
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows NTLM Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability? The attack vector is Network (AV:N) because this vulnerability is remotely exploitable and can be exploited from the internet. The attack complexity is Low (AC:L) because an attacker does not require significant prior knowledge of the system and can achieve repeatable success with the payload against the vulnerable component. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54918 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Critical | Elevation of Privilege | 5063889 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Critical | Elevation of Privilege | 5063889 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Critical | Elevation of Privilege | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Critical | Elevation of Privilege | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Critical | Elevation of Privilege | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Critical | Elevation of Privilege | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Critical | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Critical | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Critical | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Critical | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Critical | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Critical | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Critical | Elevation of Privilege | 5063875 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Critical | Elevation of Privilege | 5063875 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Critical | Elevation of Privilege | 5063875 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Critical | Elevation of Privilege | 5063875 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Critical | Elevation of Privilege | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Critical | Elevation of Privilege | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Critical | Elevation of Privilege | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Critical | Elevation of Privilege | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Critical | Elevation of Privilege | 5063947 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Critical | Elevation of Privilege | 5063947 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Critical | Elevation of Privilege | 5063906 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Critical | Elevation of Privilege | 5063906 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Critical | Elevation of Privilege | 5063950 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Critical | Elevation of Privilege | 5063950 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Critical | Elevation of Privilege | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Critical | Elevation of Privilege | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Critical | Elevation of Privilege | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Critical | Elevation of Privilege | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5063880 5063812 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5063880 5063812 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Critical | Elevation of Privilege | 5063899 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54918 | Bryan De Houwer with Crimson7 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54919
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Graphics Component Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to execute code on the Hyper-V host execution environment. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. The vulnerable endpoint is only available over the local VM interface as all external communication is blocked. This means an attacker needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with privileges could send controlled inputs to exploit this vulnerability. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54919 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Remote Code Execution | 5063709 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Remote Code Execution | 5063875 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Remote Code Execution | 5063875 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Remote Code Execution | 5063875 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Remote Code Execution | 5063875 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063878 5064010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063878 5064010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063880 5063812 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063880 5063812 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Remote Code Execution | 5063899 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063878 5064010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063878 5064010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54919 | cyanbamboo |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55223
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55223 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55223 | b2ahex cyanbamboo |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55225
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55225 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Information Disclosure | 5063899 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55225 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55226
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Graphics Kernel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Graphics Kernel allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with privileges could send controlled inputs to exploit this vulnerability. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55226 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Critical | Remote Code Execution | 5063889 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Critical | Remote Code Execution | 5063889 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Critical | Remote Code Execution | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Critical | Remote Code Execution | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Critical | Remote Code Execution | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Critical | Remote Code Execution | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Critical | Remote Code Execution | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Critical | Remote Code Execution | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Critical | Remote Code Execution | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Critical | Remote Code Execution | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Critical | Remote Code Execution | 5063947 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Critical | Remote Code Execution | 5063947 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Critical | Remote Code Execution | 5063906 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Critical | Remote Code Execution | 5063906 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Critical | Remote Code Execution | 5063950 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Critical | Remote Code Execution | 5063950 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Critical | Remote Code Execution | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Critical | Remote Code Execution | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Critical | Remote Code Execution | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Critical | Remote Code Execution | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063880 5063812 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063880 5063812 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Critical | Remote Code Execution | 5063899 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55226 | b2ahex |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55228
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Graphics Component Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. The vulnerable endpoint is only available over the local VM interface as all external communication is blocked. This means an attacker needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to execute code on the Hyper-V host execution environment. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55228 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Critical | Remote Code Execution | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55228 | b2ahex cyanbamboo |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55232
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: Deserialization of untrusted data in Microsoft High Performance Compute Pack (HPC) allows an unauthorized attacker to execute code over a network. FAQ: What do customers need to do to mitigate this vulnerability? If you are currently using HPC Pack 2019 Update 2, you need to upgrade to HPC Pack 2019 Update 3 (Build 6.3.8328) and then apply the QFE patch (Build 6.3.8352). If you are currently using HPC Pack 2016, you must migrate to 2019 to receive a fix, as there is no in-place update from 2016 to 2019. How could an attacker exploit the vulnerability? An attacker who successfully exploits this vulnerability could achieve remote code execution without user interaction. Mitigations: Customers should make sure the HPC Pack clusters are running in a trusted network secured by firewall rules especially for the TCP port 5999. Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55232 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft HPC Pack 2019 | Release Notes (Security Update) | Important | Remote Code Execution | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.8352 Quick Fix QFE |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-55232 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55236
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Graphics Kernel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Time-of-check time-of-use (toctou) race condition in Graphics Kernel allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with privileges could send controlled inputs to exploit this vulnerability. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55236 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Critical | Remote Code Execution | 5063877 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Critical | Remote Code Execution | 5063877 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Critical | Remote Code Execution | 5063877 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Critical | Remote Code Execution | 5063877 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063880 5063812 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063880 5063812 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Critical | Remote Code Execution | 5063899 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55236 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55245
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Xbox Gaming Services Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper link resolution before file access ('link following') in Xbox allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would be able to delete targeted files on a system. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55245 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Xbox Gaming Services | Release Notes (Microsoft App Store) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
30.104.13001.0. |
No | None |
CVE ID | Acknowledgements |
CVE-2025-55245 | Bighound |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55243
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OfficePlus Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Exposure of sensitive information to an unauthorized actor in Microsoft Office Plus allows an unauthorized attacker to perform spoofing over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55243 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OfficePLUS | Release Notes (Security Update) | Important | Spoofing | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
3.10.0.26585 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-55243 | Zhiniang Peng with HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55316
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Arc Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: External control of file name or path in Azure Arc allows an authorized attacker to elevate privileges locally. FAQ: **What privileges could be gained by an attacker who successfully exploited this vulnerability? ** An attacker can deploy VM Extensions on compromised Servers Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55316 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Connected Machine Agent | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.56 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-55316 | Sharan Patil with REVERSEC |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55317
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper link resolution before file access ('link following') in Microsoft AutoUpdate (MAU) allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploits this vulnerability could elevate their privileges to perform commands as Root in the target environment. How could an attacker exploit this vulnerability? A user can download an installer and before the user runs the installer, the attacker could replace it with a malicious installer. When the victim runs the malicious installer the attacker could elevate their privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55317 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft AutoUpdate for Mac | MAU (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.80 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-55317 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-49692
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper access control in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally. FAQ: What actions do customers need to take to protect themselves from this vulnerability? Customers should update their Azure Connected Machine Agent to the latest version. For more information, see What's new with Azure Connected Machine agent. What privileges could an attacker gain with successful exploitation? An attacker who successfully exploited the vulnerability could elevate their privileges as ‘NT AUTHORITY\SYSTEM’ user and perform arbitrary code execution. According to the CVSS metric, the attack vector is local (AV:L) and privileges required is low (PR:L). What does this mean in the context of this elevation of privilege vulnerability? An attacker needs to be authorized as a standard user on the localhost to execute this attack. They could then elevate their privileges to perform unauthorized operations. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-49692 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Connected Machine Agent | Release Notes (Security Update) | Important | Elevation of Privilege | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.49 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-49692 | Sharan Patil with WithSecure Consulting |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2025-47997
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SQL Server Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in SQL Server allows an authorized attacker to disclose information over a network. FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-47997 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) | 5065226 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
13.0.6470.1 |
Maybe | None | |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack | 5065227 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
13.0.7065.1 |
Maybe | None | |
Microsoft SQL Server 2017 for x64-based Systems (CU 31) | 5065225 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
14.0.3505.1 |
Maybe | None | |
Microsoft SQL Server 2017 for x64-based Systems (GDR) | 5065224 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
14.0.2085.1 |
Maybe | None | |
Microsoft SQL Server 2019 for x64-based Systems (CU 32) | 5065222 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.0.4445.1 |
Maybe | None | |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5065223 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
15.0.2145.1 |
Maybe | None | |
Microsoft SQL Server 2022 for x64-based Systems (CU 20) | 5065220 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.4212.1 |
Maybe | None | |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5065221 (Security Update) | Important | Information Disclosure | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.1150.1 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-47997 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53796
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53796 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Information Disclosure | 5063899 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53796 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53799
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Imaging Component Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Use of uninitialized resource in Windows Imaging Component allows an unauthorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Critical | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53799 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Office for Android | Release Notes (Security Update) | Critical | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.19220.20000 |
Maybe | None | |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Critical | Information Disclosure | 5063889 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Critical | Information Disclosure | 5063889 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Critical | Information Disclosure | 5063871 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Critical | Information Disclosure | 5063871 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Critical | Information Disclosure | 5063877 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Critical | Information Disclosure | 5063877 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Critical | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Critical | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Critical | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Critical | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Critical | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Critical | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Critical | Information Disclosure | 5063875 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Critical | Information Disclosure | 5063875 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Critical | Information Disclosure | 5063875 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Critical | Information Disclosure | 5063875 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Information Disclosure | 5063878 5064010 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Information Disclosure | 5063878 5064010 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Critical | Information Disclosure | 5063888 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Critical | Information Disclosure | 5063888 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Critical | Information Disclosure | 5063888 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Critical | Information Disclosure | 5063888 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Critical | Information Disclosure | 5063947 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Critical | Information Disclosure | 5063947 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Critical | Information Disclosure | 5063906 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Critical | Information Disclosure | 5063906 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Critical | Information Disclosure | 5063950 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Critical | Information Disclosure | 5063950 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Critical | Information Disclosure | 5063871 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Critical | Information Disclosure | 5063871 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Critical | Information Disclosure | 5063877 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Critical | Information Disclosure | 5063877 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Critical | Information Disclosure | 5063880 5063812 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Critical | Information Disclosure | 5063880 5063812 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Critical | Information Disclosure | 5063899 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Information Disclosure | 5063878 5064010 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Information Disclosure | 5063878 5064010 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53799 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53800
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Graphics Component Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: No cwe for this issue in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53800 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Critical | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Critical | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Critical | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Critical | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Critical | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Critical | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Critical | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Critical | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Critical | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Critical | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Critical | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Critical | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Critical | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Critical | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Critical | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Critical | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Critical | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Critical | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Critical | Elevation of Privilege | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53800 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53801
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Untrusted pointer dereference in Windows DWM allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53801 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53801 | namnp with Viettel Cyber Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53802
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Bluetooth Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Windows Bluetooth Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53802 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53802 | Hwiwon Lee (hwiwonl), SEC-agent team Jongseong Kim (nevul37), SEC-agent team with ENKI WhiteHat |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53803
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Memory Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Generation of error message containing sensitive information in Windows Kernel allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53803 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Information Disclosure | 5063889 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Information Disclosure | 5063889 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Information Disclosure | 5063875 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Information Disclosure | 5063875 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Information Disclosure | 5063875 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Information Disclosure | 5063875 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Information Disclosure | 5063899 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53803 | Aobo Wang Lewis Lee, Chunyang Han and Zhiniang Peng with HUST Lewis Lee, Chunyang Han and Zhiniang Peng with HUST Anonymous Aobo Wang |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53804
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel-Mode Driver Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Exposure of sensitive information to an unauthorized actor in Windows Kernel allows an authorized attacker to disclose information locally. FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53804 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Information Disclosure | 5063889 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Information Disclosure | 5063889 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Information Disclosure | 5063709 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Information Disclosure | 5063875 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Information Disclosure | 5063875 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Information Disclosure | 5063875 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Information Disclosure | 5063875 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Information Disclosure | 5063899 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53804 | Lewis Lee |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53805
MITRE NVD Issuing CNA: Microsoft |
CVE Title: HTTP.sys Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: Out-of-bounds read in Windows Internet Information Services allows an unauthorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53805 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Denial of Service | 5063875 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Denial of Service | 5063875 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Denial of Service | 5063875 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Denial of Service | 5063875 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063878 5064010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063878 5064010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063880 5063812 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063880 5063812 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Denial of Service | 5063899 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063878 5064010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063878 5064010 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53805 | Rutuja Shirali with Microsoft Yesayi Hovnanyan with Microsoft Matthew Cox with Microsoft Matthew Cox with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53806
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53806 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Information Disclosure | 5063888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Information Disclosure | 5063947 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Information Disclosure | 5063906 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Information Disclosure | 5063950 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Information Disclosure | 5063871 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Information Disclosure | 5063877 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063880 5063812 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Information Disclosure | 5063899 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Information Disclosure | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53806 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53807
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Graphics Component Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53807 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53807 | cyanbamboo |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53808
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Defender Firewall Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from Medium Integrity Level to Local Service. According to the CVSS metric, privileges required is high (PR:H). What privileges are required to exploit this vulnerability? To successfully exploit the vulnerability, an attacker must be part of a specific user group. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53808 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53808 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53809
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Improper input validation in Windows Local Security Authority Subsystem Service (LSASS) allows an authorized attacker to deny service over a network. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53809 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063878 5064010 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53809 | Tamas Jos (@skelsec) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-53810
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Defender Firewall Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from Medium Integrity Level to Local Service. According to the CVSS metric, privileges required is high (PR:H). What privileges are required to exploit this vulnerability? To successfully exploit the vulnerability, an attacker must be part of a specific user group. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53810 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-53810 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54091
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Integer overflow or wraparound in Windows Hyper-V allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54091 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54091 | ChengBin Wang with ZheJiang Guoli Security Technology |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54092
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54092 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54092 | Chen Le Qi (@cplearns2h4ck) with STAR Labs SG Pte. Ltd. |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54093
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows TCP/IP Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Time-of-check time-of-use (toctou) race condition in Windows TCP/IP allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54093 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54093 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54094
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Defender Firewall Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from Medium Integrity Level to Local Service. According to the CVSS metric, privileges required is high (PR:H). What privileges are required to exploit this vulnerability? To successfully exploit the vulnerability, an attacker must be part of a specific user group. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54094 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54094 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54098
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Improper access control in Windows Hyper-V allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54098 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54098 | Chen Le Qi (@cplearns2h4ck) with STAR Labs SG Pte. Ltd. Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54103
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Management Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Executive Summary: Use after free in Windows Management Services allows an unauthorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54103 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54103 | Taewoo (Tae_ω02) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54104
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Defender Firewall Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from Medium Integrity Level to Local Service. According to the CVSS metric, privileges required is high (PR:H). What privileges are required to exploit this vulnerability? To successfully exploit the vulnerability, an attacker must be part of a specific user group. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54104 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54104 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54105
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54105 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54105 | ChenJian with Sea Security Orca Team |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54107
MITRE NVD Issuing CNA: Microsoft |
CVE Title: MapUrlToZone Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Executive Summary: Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited the vulnerability could bypass the MapURLToZone method. The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2? While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms. To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability. According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability? An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability). According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted directory or file path to be compromised by the attacker. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54107 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Security Feature Bypass | 5063889 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Security Feature Bypass | 5063889 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Security Feature Bypass | 5063871 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Security Feature Bypass | 5063871 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Security Feature Bypass | 5063877 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Security Feature Bypass | 5063877 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Security Feature Bypass | 5063709 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Security Feature Bypass | 5063709 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Security Feature Bypass | 5063709 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Security Feature Bypass | 5063709 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Security Feature Bypass | 5063709 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Security Feature Bypass | 5063709 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Security Feature Bypass | 5063875 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Security Feature Bypass | 5063875 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Security Feature Bypass | 5063875 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Security Feature Bypass | 5063875 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5063878 5064010 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5063878 5064010 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) 5065435 (IE Cumulative) |
Important | Security Feature Bypass | 5063888 5060996 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 1.000 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) 5065435 (IE Cumulative) |
Important | Security Feature Bypass | 5063888 5060996 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 1.000 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) 5065435 (IE Cumulative) |
Important | Security Feature Bypass | 5063888 5060996 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 1.000 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) 5065435 (IE Cumulative) |
Important | Security Feature Bypass | 5063888 5060996 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 1.000 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065435 (IE Cumulative) 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Security Feature Bypass | 5060996 5063947 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065435 (IE Cumulative) 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Security Feature Bypass | 5060996 5063947 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065435 (IE Cumulative) 5065509 (Monthly Rollup) |
Important | Security Feature Bypass | 5060996 5063906 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065435 (IE Cumulative) 5065509 (Monthly Rollup) |
Important | Security Feature Bypass | 5060996 5063906 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065435 (IE Cumulative) 5065507 (Monthly Rollup) |
Important | Security Feature Bypass | 5060996 5063950 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065435 (IE Cumulative) 5065507 (Monthly Rollup) |
Important | Security Feature Bypass | 5060996 5063950 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Security Feature Bypass | 5063871 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Security Feature Bypass | 5063871 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Security Feature Bypass | 5063877 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Security Feature Bypass | 5063877 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5063880 5063812 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5063880 5063812 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Security Feature Bypass | 5063899 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5063878 5064010 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5063878 5064010 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54107 | Eric Lawrence with Microsoft Defender for Endpoint Eric Lawrence with Microsoft Defender for Endpoint |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54108
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54108 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54108 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54109
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Defender Firewall Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from Medium Integrity Level to Local Service. According to the CVSS metric, privileges required is high (PR:H). What privileges are required to exploit this vulnerability? To successfully exploit the vulnerability, an attacker must be part of a specific user group. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54109 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54109 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54112
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Use after free in Microsoft Virtual Hard Drive allows an authorized attacker to elevate privileges locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-free vulnerability, even as a standard user. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54112 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54112 | her0m4nt |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54113
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network. FAQ: According to the CVSS metric, the attack vector is network (AV:N), user interaction is required (UI:R), and privileges required are none (PR:N). What does that mean for this vulnerability? Exploitation of this vulnerability requires an unauthorized attacker to wait for a user to initiate a connection to a malicious server that the attacker has set up prior to the user connecting. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54113 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Remote Code Execution | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Remote Code Execution | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Remote Code Execution | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Remote Code Execution | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Remote Code Execution | 5063947 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Remote Code Execution | 5063947 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Remote Code Execution | 5063906 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Remote Code Execution | 5063906 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Remote Code Execution | 5063950 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Remote Code Execution | 5063950 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Remote Code Execution | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Remote Code Execution | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Remote Code Execution | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063880 5063812 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063880 5063812 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Remote Code Execution | 5063899 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Remote Code Execution | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54113 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54114
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Connected Devices Platform Service allows an authorized attacker to deny service locally. FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54114 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Denial of Service | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Denial of Service | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Denial of Service | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Denial of Service | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Denial of Service | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Denial of Service | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Denial of Service | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Denial of Service | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Denial of Service | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Denial of Service | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Denial of Service | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Denial of Service | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Denial of Service | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Denial of Service | 5063871 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Denial of Service | 5063899 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Denial of Service | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54114 | Zhang WangJunJie, He YiSheng with Hillstone Networks Security Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54115
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54115 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54115 | hazard |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54116
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows MultiPoint Services Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Improper access control in Windows MultiPoint Services allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would be able to delete any system files. According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability? An authorized attacker must send the user a malicious file and convince the user to open it. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54116 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54116 | BochengXiang(@Crispr) with FDU |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54900
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user needs to be tricked into running malicious files. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54900 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002782 (Security Update) | Important | Remote Code Execution | 5002758 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002782 (Security Update) | Important | Remote Code Execution | 5002758 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Office Online Server | 5002776 (Security Update) | Important | Remote Code Execution | 5002752 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.10417.20047 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-54900 | wh1tc with Kunlun lab & devoke & Zhiniang Peng with HUST |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54901
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: Buffer over-read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. FAQ: Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54901 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Excel 2016 (32-bit edition) | 5002762 (Security Update) | Important | Information Disclosure | 5002695 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Excel 2016 (64-bit edition) | 5002762 (Security Update) | Important | Information Disclosure | 5002695 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Important | Information Disclosure | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Important | Information Disclosure | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Important | Information Disclosure | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-54901 | Quan Jin with DBAPPSecurity |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54910
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Executive Summary: Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally. FAQ: Are the updates for the Microsoft Office LTSC for Mac currently available? The security update for Microsoft Office LTSC for Mac 2021 and 2024 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information. Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. How could an attacker exploit the vulnerability? An attacker who successfully exploits this vulnerability could achieve remote code execution without user interaction. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54910 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2016 (32-bit edition) | 5002781 (Security Update) | Critical | Remote Code Execution | 5002756 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002781 (Security Update) | Critical | Remote Code Execution | 5002756 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5517.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 32-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC 2024 for 64-bit editions | Click to Run (Security Update) | Critical | Remote Code Execution | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases |
No | None | |
Microsoft Office LTSC for Mac 2021 | Critical | Remote Code Execution | None | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None | |
Microsoft Office LTSC for Mac 2024 | Critical | Remote Code Execution | None | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-54910 | Li Shuang, willJ and Guang Gong with Vulnerability Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54911
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows BitLocker Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: Use after free in Windows BitLocker allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with privileges could send controlled inputs to exploit this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54911 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54911 | Hussein Alrubaye with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54912
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows BitLocker Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Use after free in Windows BitLocker allows an authorized attacker to elevate privileges locally. FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54912 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54912 | Hussein Alrubaye with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54915
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Defender Firewall Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: Access of resource using incompatible type ('type confusion') in Windows Defender Firewall Service allows an authorized attacker to elevate privileges locally. FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from Medium Integrity Level to Local Service. According to the CVSS metric, privileges required is high (PR:H). What privileges are required to exploit this vulnerability? To successfully exploit the vulnerability, an attacker must be part of a specific user group. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54915 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54915 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54917
MITRE NVD Issuing CNA: Microsoft |
CVE Title: MapUrlToZone Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Executive Summary: Protection mechanism failure in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network. FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited the vulnerability could bypass the MapURLToZone method. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted drive path to be compromised by the attacker. The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2? While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms. To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability. According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability? An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability). Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54917 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Security Feature Bypass | 5063889 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Security Feature Bypass | 5063889 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Security Feature Bypass | 5063871 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Security Feature Bypass | 5063871 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Security Feature Bypass | 5063877 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Security Feature Bypass | 5063877 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Security Feature Bypass | 5063709 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Security Feature Bypass | 5063709 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Security Feature Bypass | 5063709 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Security Feature Bypass | 5063709 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Security Feature Bypass | 5063709 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Security Feature Bypass | 5063709 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Security Feature Bypass | 5063875 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Security Feature Bypass | 5063875 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Security Feature Bypass | 5063875 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Security Feature Bypass | 5063875 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5063878 5064010 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5063878 5064010 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) 5065435 (IE Cumulative) |
Important | Security Feature Bypass | 5063888 5060996 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 1.000 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) 5065435 (IE Cumulative) |
Important | Security Feature Bypass | 5063888 5060996 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 1.000 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) 5065435 (IE Cumulative) |
Important | Security Feature Bypass | 5063888 5060996 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 1.000 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) 5065435 (IE Cumulative) |
Important | Security Feature Bypass | 5063888 5060996 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.23529 1.000 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065435 (IE Cumulative) 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Security Feature Bypass | 5060996 5063947 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065435 (IE Cumulative) 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Security Feature Bypass | 5060996 5063947 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065435 (IE Cumulative) 5065509 (Monthly Rollup) |
Important | Security Feature Bypass | 5060996 5063906 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065435 (IE Cumulative) 5065509 (Monthly Rollup) |
Important | Security Feature Bypass | 5060996 5063906 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065435 (IE Cumulative) 5065507 (Monthly Rollup) |
Important | Security Feature Bypass | 5060996 5063950 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065435 (IE Cumulative) 5065507 (Monthly Rollup) |
Important | Security Feature Bypass | 5060996 5063950 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
1.000 6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Security Feature Bypass | 5063871 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Security Feature Bypass | 5063871 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Security Feature Bypass | 5063877 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Security Feature Bypass | 5063877 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5063880 5063812 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5063880 5063812 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Security Feature Bypass | 5063899 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5063878 5064010 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Security Feature Bypass | 5063878 5064010 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-54917 | Ben Lichtman George Hughey with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55224
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to execute code locally. FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege Hyper-V guest. The attacker could traverse the guest's security boundary to execute code on the Hyper-V host execution environment. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. The vulnerable endpoint is only available over the local VM interface as all external communication is blocked. This means an attacker needs to execute code from the local machine to exploit the vulnerability. How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55224 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Critical | Remote Code Execution | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Critical | Remote Code Execution | 5063709 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Critical | Remote Code Execution | 5063875 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Critical | Remote Code Execution | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Critical | Remote Code Execution | 5063877 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063880 5063812 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Critical | Remote Code Execution | 5063899 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Critical | Remote Code Execution | 5063878 5064010 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55224 | b2ahex cyanbamboo |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2025-55227
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SQL Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: Improper neutralization of special elements used in a command ('command injection') in SQL Server allows an authorized attacker to elevate privileges over a network. FAQ: How could an attacker exploit the vulnerability? An authorized attacker could inject SQL code and run it with elevated privileges at table creation. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain sysadmin privileges. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55227 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) | 5065226 (Security Update) | Important | Elevation of Privilege | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
13.0.6470.1 |
Maybe | None | |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack | 5065227 (Security Update) | Important | Elevation of Privilege | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
13.0.7065.1 |
Maybe | None | |
Microsoft SQL Server 2017 for x64-based Systems (CU 31) | 5065225 (Security Update) | Important | Elevation of Privilege | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
14.0.3505.1 |
Maybe | None | |
Microsoft SQL Server 2017 for x64-based Systems (GDR) | 5065224 (Security Update) | Important | Elevation of Privilege | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
14.0.2085.1 |
Maybe | None | |
Microsoft SQL Server 2019 for x64-based Systems (CU 32) | 5065222 (Security Update) | Important | Elevation of Privilege | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4445.1 |
Maybe | None | |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5065223 (Security Update) | Important | Elevation of Privilege | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2145.1 |
Maybe | None | |
Microsoft SQL Server 2022 for x64-based Systems (CU 20) | 5065220 (Security Update) | Important | Elevation of Privilege | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4212.1 |
Maybe | None | |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5065221 (Security Update) | Important | Elevation of Privilege | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1150.1 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2025-55227 | Martin Rakhmanov and Albin Vattakattu |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55234
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows SMB Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: SMB Server might be susceptible to relay attacks depending on the configuration. An attacker who successfully exploited these vulnerabilities could perform relay attacks and make the users subject to elevation of privilege attacks. The SMB Server already supports mechanisms for hardening against relay attacks:
Microsoft is releasing this CVE to provide customers with audit capabilities to help them to assess their environment and to identify any potential device or software incompatibility issues before deploying SMB Server hardening measures that protect against relay attacks. If you have not already enabled SMB Server hardening measures, we advise customers to take the following actions to be protected from these relay attacks:
FAQ: Are there any further actions I need to take to be protected from relay attacks? The security updates released on September 9, 2025 enable support for auditing SMB client compatibility for SMB Server signing as well as SMB Server EPA. This allows customers to assess their environment and identify any potential device or software incompatibility issues before deploying the hardening measures that are already supported by SMB Server. Please see https://support.microsoft.com/help/5066913 for more information. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain the privileges of the compromised user. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55234 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 for x64-based Systems | 5065430 (Security Update) | Important | Elevation of Privilege | 5063889 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.21128 |
Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.6332 |
Yes | None |
Windows 10 Version 22H2 for 32-bit Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for ARM64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 10 Version 22H2 for x64-based Systems | 5065429 (Security Update) | Important | Elevation of Privilege | 5063709 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.6332 |
Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.5909 |
Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5065431 (Security Update) | Important | Elevation of Privilege | 5063875 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.5909 |
Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows 11 Version 24H2 for x64-based Systems | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5065508 (Monthly Rollup) 5065511 (Security Only) |
Important | Elevation of Privilege | 5063888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.23529 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5065468 (Monthly Rollup) 5065510 (Security Only) |
Important | Elevation of Privilege | 5063947 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27929 |
Yes | None |
Windows Server 2012 | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 (Server Core installation) | 5065509 (Monthly Rollup) | Important | Elevation of Privilege | 5063906 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25675 |
Yes | None |
Windows Server 2012 R2 | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5065507 (Monthly Rollup) | Important | Elevation of Privilege | 5063950 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22774 |
Yes | None |
Windows Server 2016 | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2016 (Server Core installation) | 5065427 (Security Update) | Important | Elevation of Privilege | 5063871 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.8422 |
Yes | None |
Windows Server 2019 | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2019 (Server Core installation) | 5065428 (Security Update) | Important | Elevation of Privilege | 5063877 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.7792 |
Yes | None |
Windows Server 2022 | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022 (Server Core installation) | 5065432 (Security Update) 5065306 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063880 5063812 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.4171 10.0.20348.4106 |
Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5065425 (Security Update) | Important | Elevation of Privilege | 5063899 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1849 |
Yes | None |
Windows Server 2025 | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
Windows Server 2025 (Server Core installation) | 5065426 (Security Update) 5065474 (SecurityHotpatchUpdate) |
Important | Elevation of Privilege | 5063878 5064010 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.6584 10.0.26100.6508 |
Yes | None |
CVE ID | Acknowledgements |
CVE-2025-55234 | Anonymous Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | |||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-21907
MITRE NVD Issuing CNA: VulnCheck |
CVE Title: VulnCheck: CVE-2024-21907 Improper Handling of Exceptional Conditions in Newtonsoft.Json
CVSS: None Executive Summary: CVE-2024-21907 addresses a mishandling of exceptional conditions vulnerability in Newtonsoft.Json before version 13.0.1. Crafted data that is passed to the JsonConvert.DeserializeObject method may trigger a StackOverflow exception resulting in denial of service. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial of service condition. The documented SQL Server updates incorporate updates in Newtonsoft.Json which address this vulnerability. Please see CVE-2024-21907 for more information. FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21907 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) | 5065226 (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
13.0.6470.1 |
Maybe | None | |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack | 5065227 (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
13.0.7065.1 |
Maybe | None | |
Microsoft SQL Server 2017 for x64-based Systems (CU 31) | 5065225 (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
14.0.3505.1 |
Maybe | None | |
Microsoft SQL Server 2017 for x64-based Systems (GDR) | 5065224 (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
14.0.2085.1 |
Maybe | None | |
Microsoft SQL Server 2019 for x64-based Systems (CU 32) | 5065222 (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
15.0.4445.1 |
Maybe | None | |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5065223 (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
15.0.2145.1 |
Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-21907 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-9867
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-9867 Inappropriate implementation in Downloads
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    05-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-9867 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
140.0.3485.54 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-9867 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-9866
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-9866 Inappropriate implementation in Extensions
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    05-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-9866 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
140.0.3485.54 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-9866 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-9865
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-9865 Inappropriate implementation in Toolbar
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    05-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-9865 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
140.0.3485.54 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-9865 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||
CVE-2025-9864
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2025-9864 Use after free in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    05-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-9864 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
140.0.3485.54 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-9864 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||
CVE-2025-53791
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.1
Executive Summary: Improper access control in Microsoft Edge (Chromium-based) allows an unauthorized attacker to bypass a security feature over a network. FAQ: **According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? ** Successful exploitation of this vulnerability requires an attacker to enable Edge Split Screen mode, have a specific configuration, and run multiple pages. **According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L), some loss of integrity (I:L) but have no effect on availability (A:N). What is the impact of this vulnerability? ** An attacker who successfully exploited the vulnerability could:
**According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? ** The user would have to open a web page that contained a malicious iframe. What is the version information for this release?
**According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? ** In this case, a successful attack could break the iframe sandbox and allow an iframe to interact with the parent DOM. Mitigations: None Workarounds: None Revision: 1.0    05-Sep-25     Information published. |
Moderate | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-53791 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Moderate | Security Feature Bypass | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C |
140.0.3485.54 |
No | None |
CVE ID | Acknowledgements |
CVE-2025-53791 | Mingi Jung with WebSec |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55241
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Entra Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.0/TemporalScore:7.8
Executive Summary: Azure Entra Elevation of Privilege Vulnerability FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    04-Sep-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55241 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Entra ID | Critical | Elevation of Privilege | None | Base: 9.0 Temporal: 7.8 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-55241 | Dirk-jan Mollema with Outsider Security Dirk-jan Mollema with Outsider Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55242
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Xbox Certification Bug Copilot Djando Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: Exposure of sensitive information to an unauthorized actor in Xbox allows an unauthorized attacker to disclose information over a network. FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    04-Sep-25     Information published. |
Critical | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55242 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Xbox Gaming Services | Critical | Information Disclosure | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-55242 | cixtor.com with Big Tech |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-54914
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Networking Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:10.0/TemporalScore:8.7
Executive Summary: None FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    04-Sep-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-54914 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Networking | Critical | Elevation of Privilege | None | Base: 10.0 Temporal: 8.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-54914 | Ziv Somech with Microsoft Shimi Gersner with Microsoft Shahar Zelig with Microsoft Stav Nir with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55238
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Dynamics 365 FastTrack Implementation Assets Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    04-Sep-25     Information published. |
Critical | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55238 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Dynamics 365 FastTrack Implementation | Critical | Information Disclosure | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-55238 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2025-55244
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Bot Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.0/TemporalScore:7.8
Executive Summary: None FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    04-Sep-25     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-55244 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Bot Service | Critical | Elevation of Privilege | None | Base: 9.0 Temporal: 7.8 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2025-55244 | bountyplz |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38678
MITRE NVD Issuing CNA: Linux |
CVE Title: netfilter: nf_tables: reject duplicate device on updates
CVSS: CVSS:3.1 Highest BaseScore:6.0/TemporalScore:6.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    04-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38678 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 6.0 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38678 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38707
MITRE NVD Issuing CNA: Linux |
CVE Title: fs/ntfs3: Add sanity check for file name
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38707 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38707 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38728
MITRE NVD Issuing CNA: Linux |
CVE Title: smb3: fix for slab out of bounds on mount to ksmbd
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38728 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38728 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39731
MITRE NVD Issuing CNA: Linux |
CVE Title: f2fs: vm_unmap_ram() may be called from an invalid context
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39731 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39731 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39732
MITRE NVD Issuing CNA: Linux |
CVE Title: wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39732 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39732 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39730
MITRE NVD Issuing CNA: Linux |
CVE Title: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39730 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39730 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-7039
MITRE NVD Issuing CNA: redhat |
CVE Title: Glib: buffer under-read on glib through glib/gfileutils.c via get_tmp_file()
CVSS: CVSS:3.1 Highest BaseScore:3.7/TemporalScore:3.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-7039 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 glib 2.78.6-3 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 3.7 Temporal: 3.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N |
No | None | ||
cbl2 glib 2.71.0-5 on CBL Mariner 2.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 3.7 Temporal: 3.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N |
No | None |
CVE ID | Acknowledgements |
CVE-2025-7039 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38688
MITRE NVD Issuing CNA: Linux |
CVE Title: iommufd: Prevent ALIGN() overflow
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38688 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38688 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-38718
MITRE NVD Issuing CNA: Linux |
CVE Title: sctp: linearize cloned gso packets in sctp_rcv
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38718 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38718 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38723
MITRE NVD Issuing CNA: Linux |
CVE Title: LoongArch: BPF: Fix jump offset calculation in tailcall
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38723 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38723 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38685
MITRE NVD Issuing CNA: Linux |
CVE Title: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38685 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38685 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38696
MITRE NVD Issuing CNA: Linux |
CVE Title: MIPS: Don't crash in stack_top() for tasks without ABI or vDSO
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38696 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38696 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38691
MITRE NVD Issuing CNA: Linux |
CVE Title: pNFS: Fix uninited ptr deref in block/scsi layout
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38691 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38691 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38729
MITRE NVD Issuing CNA: Linux |
CVE Title: ALSA: usb-audio: Validate UAC3 power domain descriptors, too
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38729 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38729 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38680
MITRE NVD Issuing CNA: Linux |
CVE Title: media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()
CVSS: CVSS:3.1 Highest BaseScore:3.3/TemporalScore:3.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38680 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 3.3 Temporal: 3.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38680 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-38710
MITRE NVD Issuing CNA: Linux |
CVE Title: gfs2: Validate i_depth for exhash directories
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38710 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38710 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-38709
MITRE NVD Issuing CNA: Linux |
CVE Title: loop: Avoid updating block size under exclusive owner
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38709 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38709 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38681
MITRE NVD Issuing CNA: Linux |
CVE Title: mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38681 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38681 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-38695
MITRE NVD Issuing CNA: Linux |
CVE Title: scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38695 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38695 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-38698
MITRE NVD Issuing CNA: Linux |
CVE Title: jfs: Regular file corruption check
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38698 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.1 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38698 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38708
MITRE NVD Issuing CNA: Linux |
CVE Title: drbd: add missing kref_get in handle_write_conflicts
CVSS: CVSS:3.1 Highest BaseScore:6.3/TemporalScore:6.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38708 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 6.3 Temporal: 6.3 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38708 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38715
MITRE NVD Issuing CNA: Linux |
CVE Title: hfs: fix slab-out-of-bounds in hfs_bnode_read()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38715 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38715 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38730
MITRE NVD Issuing CNA: Linux |
CVE Title: io_uring/net: commit partial buffers on retry
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38730 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38730 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-38714
MITRE NVD Issuing CNA: Linux |
CVE Title: hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()
CVSS: CVSS:3.1 Highest BaseScore:9.0/TemporalScore:8.2
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38714 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 9.0 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H/E:U |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38714 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38697
MITRE NVD Issuing CNA: Linux |
CVE Title: jfs: upper bound check of tree index in dbAllocAG
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38697 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38697 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38684
MITRE NVD Issuing CNA: Linux |
CVE Title: net/sched: ets: use old 'nbands' while purging unused classes
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38684 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38684 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38716
MITRE NVD Issuing CNA: Linux |
CVE Title: hfs: fix general protection fault in hfs_find_init()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38716 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38716 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38699
MITRE NVD Issuing CNA: Linux |
CVE Title: scsi: bfa: Double-free fix
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38699 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38699 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38705
MITRE NVD Issuing CNA: Linux |
CVE Title: drm/amd/pm: fix null pointer access
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38705 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38705 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38724
MITRE NVD Issuing CNA: Linux |
CVE Title: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
CVSS: CVSS:3.1 Highest BaseScore:6.8/TemporalScore:6.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38724 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 6.8 Temporal: 6.8 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38724 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-38702
MITRE NVD Issuing CNA: Linux |
CVE Title: fbdev: fix potential buffer overflow in do_register_framebuffer()
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38702 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.8 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38702 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38687
MITRE NVD Issuing CNA: Linux |
CVE Title: comedi: fix race between polling and detaching
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38687 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38687 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38679
MITRE NVD Issuing CNA: Linux |
CVE Title: media: venus: Fix OOB read due to missing payload bound check
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38679 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38679 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38712
MITRE NVD Issuing CNA: Linux |
CVE Title: hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38712 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38712 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38721
MITRE NVD Issuing CNA: Linux |
CVE Title: netfilter: ctnetlink: fix refcount leak on table dump
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38721 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38721 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38711
MITRE NVD Issuing CNA: Linux |
CVE Title: smb/server: avoid deadlock when linking with ReplaceIfExists
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38711 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38711 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38703
MITRE NVD Issuing CNA: Linux |
CVE Title: drm/xe: Make dma-fences compliant with the safe access rules
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38703 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38703 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38722
MITRE NVD Issuing CNA: Linux |
CVE Title: habanalabs: fix UAF in export_dmabuf()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38722 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38722 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38692
MITRE NVD Issuing CNA: Linux |
CVE Title: exfat: add cluster chain loop check for dir
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38692 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38692 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38717
MITRE NVD Issuing CNA: Linux |
CVE Title: net: kcm: Fix race condition in kcm_unattach()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38717 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38717 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38725
MITRE NVD Issuing CNA: Linux |
CVE Title: net: usb: asix_devices: add phy_mask for ax88772 mdio bus
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38725 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38725 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38704
MITRE NVD Issuing CNA: Linux |
CVE Title: rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer access
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38704 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38704 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38706
MITRE NVD Issuing CNA: Linux |
CVE Title: ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()
CVSS: CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38706 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 4.7 Temporal: 4.7 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38706 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-38701
MITRE NVD Issuing CNA: Linux |
CVE Title: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38701 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38701 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38713
MITRE NVD Issuing CNA: Linux |
CVE Title: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
CVSS: CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38713 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 6.1 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38713 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38700
MITRE NVD Issuing CNA: Linux |
CVE Title: scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated
CVSS: CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    06-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38700 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 4.7 Temporal: 4.7 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38700 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-39703
MITRE NVD Issuing CNA: Linux |
CVE Title: net, hsr: reject HSR frame if skb can't hold tag
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39703 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39703 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39697
MITRE NVD Issuing CNA: Linux |
CVE Title: NFS: Fix a race when updating an existing write
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39697 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39697 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39709
MITRE NVD Issuing CNA: Linux |
CVE Title: media: venus: protect against spurious interrupts during probe
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39709 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39709 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39726
MITRE NVD Issuing CNA: Linux |
CVE Title: s390/ism: fix concurrency management in ism_cmd()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39726 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39726 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39685
MITRE NVD Issuing CNA: Linux |
CVE Title: comedi: pcl726: Prevent invalid irq number
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39685 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39685 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39686
MITRE NVD Issuing CNA: Linux |
CVE Title: comedi: Make insn_rw_emulate_bits() do insn->n samples
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39686 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39686 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39702
MITRE NVD Issuing CNA: Linux |
CVE Title: ipv6: sr: Fix MAC comparison to be constant-time
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39702 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39702 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-39710
MITRE NVD Issuing CNA: Linux |
CVE Title: media: venus: Add a check for packet size after reading from shared memory
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39710 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39710 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39718
MITRE NVD Issuing CNA: Linux |
CVE Title: vsock/virtio: Validate length in packet header before skb_put()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39718 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39718 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38735
MITRE NVD Issuing CNA: Linux |
CVE Title: gve: prevent ethtool ops after shutdown
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38735 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38735 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39684
MITRE NVD Issuing CNA: Linux |
CVE Title: comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39684 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39684 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39692
MITRE NVD Issuing CNA: Linux |
CVE Title: smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39692 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39692 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39724
MITRE NVD Issuing CNA: Linux |
CVE Title: serial: 8250: fix panic due to PSLVERR
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39724 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39724 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-39689
MITRE NVD Issuing CNA: Linux |
CVE Title: ftrace: Also allocate and copy hash for reading of filter files
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39689 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.1 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39689 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39720
MITRE NVD Issuing CNA: Linux |
CVE Title: ksmbd: fix refcount leak causing resource not released
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39720 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39720 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39711
MITRE NVD Issuing CNA: Linux |
CVE Title: media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39711 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39711 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39721
MITRE NVD Issuing CNA: Linux |
CVE Title: crypto: qat - flush misc workqueue during device shutdown
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39721 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39721 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39687
MITRE NVD Issuing CNA: Linux |
CVE Title: iio: light: as73211: Ensure buffer holes are zeroed
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39687 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39687 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39694
MITRE NVD Issuing CNA: Linux |
CVE Title: s390/sclp: Fix SCCB present check
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39694 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39694 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39693
MITRE NVD Issuing CNA: Linux |
CVE Title: drm/amd/display: Avoid a NULL pointer dereference
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39693 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39693 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39705
MITRE NVD Issuing CNA: Linux |
CVE Title: drm/amd/display: fix a Null pointer dereference vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39705 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39705 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-39677
MITRE NVD Issuing CNA: Linux |
CVE Title: net/sched: Fix backlog accounting in qdisc_dequeue_internal
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39677 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39677 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39706
MITRE NVD Issuing CNA: Linux |
CVE Title: drm/amdkfd: Destroy KFD debugfs after destroy KFD wq
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39706 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39706 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39707
MITRE NVD Issuing CNA: Linux |
CVE Title: drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39707 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39707 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38734
MITRE NVD Issuing CNA: Linux |
CVE Title: net/smc: fix UAF on smcsk after smc_listen_out()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38734 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38734 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2025-39701
MITRE NVD Issuing CNA: Linux |
CVE Title: ACPI: pfr_update: Fix the driver update version check
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39701 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39701 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39682
MITRE NVD Issuing CNA: Linux |
CVE Title: tls: fix handling of zero-length records on the rx_list
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39682 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39682 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39715
MITRE NVD Issuing CNA: Linux |
CVE Title: parisc: Revise gateway LWS calls to probe user read access
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39715 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39715 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39673
MITRE NVD Issuing CNA: Linux |
CVE Title: ppp: fix race conditions in ppp_fill_forward_path
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39673 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39673 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39675
MITRE NVD Issuing CNA: Linux |
CVE Title: drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session()
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39675 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39675 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39716
MITRE NVD Issuing CNA: Linux |
CVE Title: parisc: Revise __get_user() to probe user read access
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39716 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39716 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38732
MITRE NVD Issuing CNA: Linux |
CVE Title: netfilter: nf_reject: don't leak dst refcount for loopback packets
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38732 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38732 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39691
MITRE NVD Issuing CNA: Linux |
CVE Title: fs/buffer: fix use-after-free when call bh_read() helper
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39691 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39691 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39719
MITRE NVD Issuing CNA: Linux |
CVE Title: iio: imu: bno055: fix OOB access of hw_xlate array
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39719 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39719 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39714
MITRE NVD Issuing CNA: Linux |
CVE Title: media: usbtv: Lock resolution while streaming
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39714 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39714 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39713
MITRE NVD Issuing CNA: Linux |
CVE Title: media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39713 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39713 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39679
MITRE NVD Issuing CNA: Linux |
CVE Title: drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor().
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39679 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39679 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39676
MITRE NVD Issuing CNA: Linux |
CVE Title: scsi: qla4xxx: Prevent a potential error pointer dereference
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39676 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39676 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39683
MITRE NVD Issuing CNA: Linux |
CVE Title: tracing: Limit access to parser->buffer when trace_get_user failed
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39683 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39683 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-38736
MITRE NVD Issuing CNA: Linux |
CVE Title: net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-38736 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-38736 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-39681
MITRE NVD Issuing CNA: Linux |
CVE Title: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-39681 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 kernel 6.6.96.2-1 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-39681 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-57052
MITRE NVD Issuing CNA: mitre |
CVE Title: cJSON 1.5.0 through 1.7.18 allows out-of-bounds access via the decode_array_index_from_pointer function in cJSON_Utils.c, allowing remote attackers to bypass array bounds checking and access restricted data via malformed JSON pointer strings containing alphanumeric characters.
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-57052 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 ceph 18.2.2-10 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-57052 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2025-9566
MITRE NVD Issuing CNA: redhat |
CVE Title: Podman: podman kube play command may overwrite host files
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:8.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-9566 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 libcontainers-common 20240213-3 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 8.1 Temporal: 8.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
No | None |
CVE ID | Acknowledgements |
CVE-2025-9566 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||
CVE-2025-9901
MITRE NVD Issuing CNA: redhat |
CVE Title: Libsoup: improper handling of http vary header in libsoup caching
CVSS: CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.6
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    07-Sep-25     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
N/A | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2025-9901 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
azl3 libsoup 3.4.4-9 on Azure Linux 3.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.9 Temporal: 5.6 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P |
No | None | ||
cbl2 libsoup 3.0.4-7 on CBL Mariner 2.0 | CBL-Mariner Releases (Security Update) | Unknown | Unknown | Base: 5.9 Temporal: 5.6 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P |
No | None |
CVE ID | Acknowledgements |
CVE-2025-9901 | None |